ID-based non-interactive deniable authentication protocol

被引:1
|
作者
Shi Wei-min [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
关键词
D O I
10.1109/IAS.2009.46
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Non-interactive deniable authentication protocol is vulnerable to the receiver key-compromise impersonation attack, which are owing to the reason that the authentication massage is computed from the receiver's private and some other public values. Consequently, in order to be suitable for evaluation the security of non-interactive deniable authentication protocol, we have to re-define the attribute of key-compromise impersonation as the attribute of sender key-compromise impersonation, then proposes an simple and efficient ID-based non-interactive deniable authentication protocol. The proposed protocol has no need for use of an additional signature to provide extra authentication, and satisfies authenticity, deniability and sender key-compromise impersonation security attributes simultaneously
引用
收藏
页码:479 / 482
页数:4
相关论文
共 50 条
  • [1] ID-based Non-interactive Deniable Authentication Protocol from Pairings
    Xin Xiangjun
    Chen Dongsheng
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1077 - 1080
  • [2] Non-interactive deniable authentication protocol based on factoring
    Lu, RX
    Cao, ZF
    COMPUTER STANDARDS & INTERFACES, 2005, 27 (04) : 401 - 405
  • [3] Improvement of an ID-Based Deniable Authentication Protocol
    Tzu-Chun Lin
    JournalofElectronicScienceandTechnology, 2018, 16 (02) : 139 - 144
  • [5] Improvement of an ID-based deniable authentication protocol
    Lin T.-C.
    Lin, Tzu-Chun (lintc@fcu.edu.tw), 2018, Univ. of Electronic Science and Technology of China (16): : 139 - 144
  • [6] A new ID-based deniable authentication protocol
    Lu, Rongxing
    Cao, Zhenfu
    Wang, Shengbao
    Bao, Haiyong
    INFORMATICA, 2007, 18 (01) : 67 - 78
  • [7] An enhanced ID-based deniable authentication protocol on pairings
    Lim, Meng-Hui
    Lee, Sanggon
    Park, Youngho
    Lee, Hoonjae
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 1008 - 1017
  • [8] A secure non-interactive deniable authentication protocol based on discrete logarithms
    Chuang, Yu-Hao
    Shu, Wesley
    Hsu, Kevin C.
    Hsu, Chien-Lung
    ICIC Express Letters, Part B: Applications, 2012, 3 (03): : 507 - 512
  • [9] An efficient ID-based deniable authentication protocol from pairings
    Cao, TJ
    Lin, DD
    Xue, R
    19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 388 - 391
  • [10] Non-interactive deniable ring authentication
    Susilo, W
    Mu, Y
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 386 - 401