Robust Deniable Authentication Protocol

被引:0
|
作者
Eun-Jun Yoon
Kee-Young Yoo
Sang-Soo Yeo
Changhoon Lee
机构
[1] Kyungpook National University,School of Electrical Engineering and Computer Science
[2] Kyungpook National University,Department of Computer Engineering
[3] Mokwon University,Division of Computer Engineering
[4] Hanshin University,School of Computer Engineering
来源
Wireless Personal Communications | 2010年 / 55卷
关键词
Deniable authentication; Cryptography; Security; ElGamal cryptography; Electronic voting system;
D O I
暂无
中图分类号
学科分类号
摘要
Deniable authentication protocol is a new technique of modern cryptography. The protocol not only enables an intended receiver to identify the source of a received message, but also prevents a third party from identifying the source of the message. Recently, Shao et al. pointed out that Wang et al.’s deniable authentication protocol based on ElGamal cryptosystem is insecure to a person-in-the-middle attack; that is, in the whole process, the receiver cannot be aware of the existence of this adversary as well as the modification of the messages. Furthermore, they also presented a modification of Wang et al.’s protocol to overcome the security flaw. However, this paper demonstrates that Shao et al.’s improved protocol is still susceptible to a malicious receiver’s impersonation attack. To mitigate this security breach, we propose a robust deniable authentication protocol based on ElGamal cryptography.
引用
收藏
页码:81 / 90
页数:9
相关论文
共 50 条
  • [1] Robust Deniable Authentication Protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    Yeo, Sang-Soo
    Lee, Changhoon
    WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 81 - 90
  • [2] Cryptanalysis and Improvement of Robust Deniable Authentication Protocol
    Li, Fagen
    Takagi, Tsuyoshi
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (04) : 1391 - 1398
  • [3] Cryptanalysis and Improvement of Robust Deniable Authentication Protocol
    Fagen Li
    Tsuyoshi Takagi
    Wireless Personal Communications, 2013, 69 : 1391 - 1398
  • [4] Quantum deniable authentication protocol
    Wei-Min Shi
    Yi-Hua Zhou
    Yu-Guang Yang
    Quantum Information Processing, 2014, 13 : 1501 - 1510
  • [5] An improvement of a deniable authentication protocol
    Hsieh, BT
    Sun, HM
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (10) : 3099 - 3101
  • [6] An efficient deniable authentication protocol
    Huang, HF
    Chang, CC
    2005 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2005, : 307 - 310
  • [7] An Enhanced Deniable Authentication Protocol
    Li Gang
    Xin Xiangjun
    Li Wei
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 336 - +
  • [8] An improved deniable authentication protocol
    Shao, Jun
    Cao, Zhenfu
    Lu, Rongxing
    NETWORKS, 2006, 48 (04) : 179 - 181
  • [9] An Improved Deniable Authentication Protocol
    Lin, Chia-Chen
    Chang, Chin-Chen
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (11): : 240 - 243
  • [10] Quantum deniable authentication protocol
    Shi, Wei-Min
    Zhou, Yi-Hua
    Yang, Yu-Guang
    QUANTUM INFORMATION PROCESSING, 2014, 13 (07) : 1501 - 1510