Efficient and Short Identity-Based Deniable Authenticated Encryption

被引:1
|
作者
Jin, Chunhua [1 ]
Zhao, Jianyang [1 ]
机构
[1] Huaiyin Inst Technol, Fac Comp & Software Engn, Huaian 233003, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Deniable authenticated encryption; Identity-based cryptography; Random oracle model; PROTOCOL; SCHEME; SIGNCRYPTION;
D O I
10.1007/978-3-319-68542-7_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deniable authentication is an important security requirement for many applications that require user privacy protection, since the sender can deny that he/she has signed the message. Considering the importance of communication efficiency, in this paper, we explore the novel deniable authenticated encryption, which outperforms the existing ones in terms of communication costs and ciphertext size. Our protocol meets all the security requirement of message confidentiality and deniable message authentication. Our protocol is based on identity cryptography and can avoid the public key certificates based public key infrastructure (PKI). Our protocol is provably secure in the random oracle model.
引用
收藏
页码:244 / 255
页数:12
相关论文
共 50 条
  • [1] An Efficient Identity-Based Deniable Authenticated Encryption Scheme
    Wu, Weifeng
    Li, Fagen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1904 - 1919
  • [2] Identity-based Deniable Authenticated Encryption for E-voting Systems
    Jin, Chunhua
    Chen, Guanhua
    Zhao, Jianyang
    Gao, Shangbing
    Yu, Changhui
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (06) : 3299 - 3315
  • [3] Identity-based deniable authenticated encryption and its application to e-mail system
    Li, Fagen
    Zheng, Zhaohui
    Jin, Chunhua
    TELECOMMUNICATION SYSTEMS, 2016, 62 (04) : 625 - 639
  • [4] Identity-based deniable authenticated encryption and its application to e-mail system
    Fagen Li
    Zhaohui Zheng
    Chunhua Jin
    Telecommunication Systems, 2016, 62 : 625 - 639
  • [5] Identity-based authenticated broadcast encryption and distributed authenticated encryption
    Mu, Y
    Susilo, W
    Lin, YX
    Ruan, C
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2004, PROCEEDINGS, 2004, 3321 : 169 - 181
  • [6] Identity-Based Authenticated Encryption with Identity Confidentiality
    Zhao, Yunlei
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 633 - 653
  • [7] Identity-based authenticated encryption with identity confidentiality
    Shen, Shiyu
    Wang, Hongbing
    Zhao, Yunlei
    THEORETICAL COMPUTER SCIENCE, 2022, 901 : 1 - 18
  • [8] Efficient revocable identity-based encryption with short public parameters
    Emura, Keita
    Seo, Jae Hong
    Watanabe, Yohei
    THEORETICAL COMPUTER SCIENCE, 2021, 863 : 127 - 155
  • [9] An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection
    Huang, Wen
    Liao, Yongjian
    Zhou, Shijie
    Chen, Hongjie
    IEEE ACCESS, 2019, 7 : 43453 - 43461
  • [10] Efficient biometric identity-based encryption
    Li, Xiaoguo
    Xiang, Tao
    Chen, Fei
    Guo, Shangwei
    INFORMATION SCIENCES, 2018, 465 : 248 - 264