ID-based non-interactive deniable authentication protocol

被引:1
|
作者
Shi Wei-min [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
关键词
D O I
10.1109/IAS.2009.46
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Non-interactive deniable authentication protocol is vulnerable to the receiver key-compromise impersonation attack, which are owing to the reason that the authentication massage is computed from the receiver's private and some other public values. Consequently, in order to be suitable for evaluation the security of non-interactive deniable authentication protocol, we have to re-define the attribute of key-compromise impersonation as the attribute of sender key-compromise impersonation, then proposes an simple and efficient ID-based non-interactive deniable authentication protocol. The proposed protocol has no need for use of an additional signature to provide extra authentication, and satisfies authenticity, deniability and sender key-compromise impersonation security attributes simultaneously
引用
收藏
页码:479 / 482
页数:4
相关论文
共 50 条
  • [21] An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes
    Youn, Taek-Young
    Lee, Changhoon
    Park, Young-Ho
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 353 - 357
  • [22] A new probabilistic ID-based non-interactive key sharing scheme
    Murakami, Y
    Sakai, R
    Kasahara, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (01) : 2 - 9
  • [23] Cryptanalysis on improved Chou et al.'s ID-based deniable authentication protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 87 - +
  • [24] RETRACTED: A Non-interactive Deniable Authentication Protocol based on Elliptic Curve Discrete Logarithm Problem (Retracted Article)
    Shao, Fei
    Meng, Bo
    2011 INTERNATIONAL CONFERENCE ON ENERGY AND ENVIRONMENTAL SCIENCE-ICEES 2011, 2011, 11 : 1018 - 1025
  • [25] A Non-interactive Deniable and Negative Authentication Scheme in Random Oracle Model
    Zhu, Hongfeng
    Liu, Tianhua
    Geng, Shuai
    Zhang, Yuanle
    Wang, Liwei
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (03): : 645 - 653
  • [26] ID-based deniable ring authentication with constant-size signature
    Wang L.
    Zhang G.
    Ma C.
    Frontiers of Computer Science in China, 2008, 2 (01): : 106 - 112
  • [27] Non-Interactive Fair Deniable Authentication Protocols with Indistinguishable Confidentiality and Anonymity
    Hwang, Shin-Jia
    Chi, Jen-Fu
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2013, 16 (03): : 305 - 318
  • [28] Collusion-attack free ID-based non-interactive key sharing
    Tanaka, Hatsukazu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (06) : 1820 - 1824
  • [29] A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on internet voting protocol
    Meng, Bo
    Information Technology Journal, 2009, 8 (03) : 302 - 309
  • [30] An optimal non-interactive message authentication protocol
    Pasini, S
    Vaudenay, S
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 280 - 294