ID-based non-interactive deniable authentication protocol

被引:1
|
作者
Shi Wei-min [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
关键词
D O I
10.1109/IAS.2009.46
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Non-interactive deniable authentication protocol is vulnerable to the receiver key-compromise impersonation attack, which are owing to the reason that the authentication massage is computed from the receiver's private and some other public values. Consequently, in order to be suitable for evaluation the security of non-interactive deniable authentication protocol, we have to re-define the attribute of key-compromise impersonation as the attribute of sender key-compromise impersonation, then proposes an simple and efficient ID-based non-interactive deniable authentication protocol. The proposed protocol has no need for use of an additional signature to provide extra authentication, and satisfies authenticity, deniability and sender key-compromise impersonation security attributes simultaneously
引用
收藏
页码:479 / 482
页数:4
相关论文
共 50 条
  • [41] Non-Interactive ID-Based Proxy Re-Signature Scheme for IoT Based on Mobile Edge Computing
    Zhang, Jianhong
    Bai, Wenle
    Wang, Yuehai
    IEEE ACCESS, 2019, 7 : 37865 - 37875
  • [42] Non-interactive Certificate Update Protocol for Efficient Authentication in IoT
    Duan, Li
    Li, Yong
    Liao, Lijun
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS ( IOT 2019), 2019,
  • [43] Cryptanalysis of a non-interactive deniable ring signature scheme
    Huiwen Jia
    Chunming Tang
    International Journal of Information Security, 2021, 20 : 103 - 112
  • [44] Cryptanalysis of a non-interactive deniable ring signature scheme
    Jia, Huiwen
    Tang, Chunming
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (01) : 103 - 112
  • [45] ID-Based Deniable Authentication Protocol with Key Agreement and Time-Bound Properties for 6G-Based WBAN Healthcare Environments
    Hsu, Chien-Lung
    Nguyen, Anh-Tuan
    Cheng, Guan-Lin
    ELECTRONICS, 2023, 12 (12)
  • [46] Security weaknesses of dynamic ID-based remote user authentication protocol
    Lee, Hyoungseob
    Choi, Donghyun
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    World Academy of Science, Engineering and Technology, 2009, 35 : 190 - 193
  • [47] An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET
    Kumar, Vimal
    Kumar, Rakesh
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 110 - 121
  • [48] Security weaknesses of dynamic ID-based remote user authentication protocol
    Lee, Hyoungseob
    Choi, Donghyun
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    World Academy of Science, Engineering and Technology, 2009, 59 : 190 - 193
  • [49] Non-interactive cryptosystem for entity authentication
    Lee, HW
    Kim, JE
    Kim, TY
    INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 72 - 84
  • [50] Authentication Protocols and Authentication on the Base of PKI and ID-based
    Min Thant
    Zaw, Than Myo
    2018 WAVE ELECTRONICS AND ITS APPLICATION IN INFORMATION AND TELECOMMUNICATION SYSTEMS (WECONF), 2018,