ID-based non-interactive deniable authentication protocol

被引:1
|
作者
Shi Wei-min [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
关键词
D O I
10.1109/IAS.2009.46
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Non-interactive deniable authentication protocol is vulnerable to the receiver key-compromise impersonation attack, which are owing to the reason that the authentication massage is computed from the receiver's private and some other public values. Consequently, in order to be suitable for evaluation the security of non-interactive deniable authentication protocol, we have to re-define the attribute of key-compromise impersonation as the attribute of sender key-compromise impersonation, then proposes an simple and efficient ID-based non-interactive deniable authentication protocol. The proposed protocol has no need for use of an additional signature to provide extra authentication, and satisfies authenticity, deniability and sender key-compromise impersonation security attributes simultaneously
引用
收藏
页码:479 / 482
页数:4
相关论文
共 50 条
  • [31] ID-based non-interactive zero-knowledge proof system based on one-out-of-two non-interactive oblivious transfer
    Chen, YH
    Hwang, T
    COMPUTER COMMUNICATIONS, 1995, 18 (12) : 993 - 996
  • [32] A New ID-based deniable ring authentication with constant-size signature
    Hu, Chengyu
    Liu, Pengtao
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 1977 - +
  • [33] Security vulnerability in a non-interactive ID-based proxy re-encryption scheme
    Koo, Woo Kwon
    Hwang, Jung Yeon
    Lee, Dong Hoon
    INFORMATION PROCESSING LETTERS, 2009, 109 (23-24) : 1260 - 1262
  • [34] Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme
    Jeong, Ik Rae
    Kwon, Jeong Ok
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (03): : 932 - 934
  • [35] ID-based cryptographic schemes using a non-interactive public-key distribution system
    Tseng, YM
    Jan, JK
    14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 237 - 243
  • [36] A secure non-interactive chaotic maps-based deniable authentication scheme with privacy protection in standard model
    Zhu H.
    Zhang Y.
    Journal of Computers (Taiwan), 2018, 29 (03) : 109 - 120
  • [37] Authentication and ID-Based Key Management Protocol in Pervasive Environment
    Moon, Jong Sik
    Park, Jong Hyuk
    Lee, Deok Gyu
    Lee, Im-Yeong
    WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 91 - 103
  • [38] Non-interactive certificate update protocol for efficient authentication in IoT
    Duan, Li
    Li, Yong
    Liao, Lijun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 (113): : 132 - 144
  • [39] A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol
    Irakiza, David
    Karim, Md E.
    Phoha, Vir V.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (07) : 1133 - 1140
  • [40] Authentication and ID-Based Key Management Protocol in Pervasive Environment
    Jong Sik Moon
    Jong Hyuk Park
    Deok Gyu Lee
    Im-Yeong Lee
    Wireless Personal Communications, 2010, 55 : 91 - 103