A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on internet voting protocol

被引:1
|
作者
Meng, Bo [1 ]
机构
[1] School of Computer, South-Center University for Nationalities, Wuhan, 430074, Hubei, China
关键词
Authentication - Internet protocols - Network security;
D O I
10.3923/itj.2009.302.309
中图分类号
学科分类号
摘要
In this study, firstly the status and security properties of deniable authentication protocol are discussed and then a secure non-interactive deniable authentication protocol based on discrete logarithm problem is developed. At the same time we prove that the proposed protocol has properties: completeness, strong deniability, weak deniability, security of forgery attack, security of impersonate attack, security of compromising session secret attack and security of man-in-the-middle attack. The security properties of several typical protocols and proposed protocol are compared. Lastly, an application of the proposed protocol, an internet voting protocol with receipt-freeness without strong physical assumption, is provided. © 2009 Asian Network for Scientific Information.
引用
收藏
页码:302 / 309
相关论文
共 13 条
  • [1] A secure non-interactive deniable authentication protocol based on discrete logarithms
    Chuang, Yu-Hao
    Shu, Wesley
    Hsu, Kevin C.
    Hsu, Chien-Lung
    ICIC Express Letters, Part B: Applications, 2012, 3 (03): : 507 - 512
  • [2] RETRACTED: A Non-interactive Deniable Authentication Protocol based on Elliptic Curve Discrete Logarithm Problem (Retracted Article)
    Shao, Fei
    Meng, Bo
    2011 INTERNATIONAL CONFERENCE ON ENERGY AND ENVIRONMENTAL SCIENCE-ICEES 2011, 2011, 11 : 1018 - 1025
  • [3] Non-interactive deniable authentication protocol based on factoring
    Lu, RX
    Cao, ZF
    COMPUTER STANDARDS & INTERFACES, 2005, 27 (04) : 401 - 405
  • [4] A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography
    Chuang, Yu-Hao
    Hsu, Chien-Lung
    Shu, Wesley
    Hsu, Kevin C.
    Liao, Min-Wen
    NEW TRENDS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2015, 598 : 183 - 190
  • [5] ID-based non-interactive deniable authentication protocol
    Shi Wei-min
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 479 - 482
  • [6] A non-interactive quantum deniable authentication protocol based on asymmetric quantum cryptography
    Shi, Wei-Min
    Zhang, Jan-Biao
    Zhou, Yi-Hua
    Yang, Yu-Guang
    Zhang, Xin-Lan
    OPTIK, 2016, 127 (20): : 8693 - 8697
  • [7] ID-based Non-interactive Deniable Authentication Protocol from Pairings
    Xin Xiangjun
    Chen Dongsheng
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1077 - 1080
  • [8] An efficient non-interactive deniable authentication protocol with anonymous sender protection
    Hwang, Shin-Jia
    Chao, Chien-Hung
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (03): : 219 - 231
  • [9] Deniable authentication protocol based on integer factorization and discrete logarithm problems
    Kar, Jayaprakash
    ICIC Express Letters, 2013, 7 (07): : 2061 - 2067
  • [10] Non-interactive deniable authentication protocol based on factoring (vol 27, pg 401, 2005)
    Lu, Rongxing
    Cao, Zhenfu
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) : 275 - 275