Privacy-Enhanced Deniable Authentication E-Mail Service

被引:0
|
作者
Ki, JuHee [1 ]
Hwang, Jung Yeong [2 ]
Nyang, DaeHun [3 ]
Lee, Dong Hoon [4 ]
Lim, Jongin [4 ]
机构
[1] KEIT, Informat Secur PD Team, Taejon, South Korea
[2] ETRI, Knowledge based Informat Secur Dept, Taejon, South Korea
[3] Inha Univ, Informat Secur Res Lab, Incheon, South Korea
[4] Korea Univ, CIST, Seoul, South Korea
关键词
E-mail; authentication; Deniable Authentication; Strong Designated Verifier Signature; Anonymity; PROTOCOLS; PERFECT; SECURE; SIGNATURES; DESIGN;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
E-mail brings us lots of conveniences. Especially with help of PGP and S/MIME, it gives both confidentiality and message/origin authentication. However, in some cases for strong privacy, a message sender will not want to let others know even the fact that he sent a message to a recipient. Very recently, Ham and Ren proposed a fully deniable authentication scheme for E-mail where a sender can repudiate his or her signature. In this paper, however, their deniable authentication scheme is proved not to be fully deniable. To resolve this deniability problem, we suggest a designated verifier signature scheme to support strong privacy, and construct a privacy-enhanced deniable authentication E-mail scheme using the designated verifier signature scheme. Compared with the Ham and Ren's scheme, the proposed scheme has a simple cryptographic structure and can be easily realized with the existing secure E-mail systems.
引用
收藏
页码:16 / +
页数:3
相关论文
共 50 条
  • [1] Design of fully deniable authentication service for e-mail applications
    Harn, Lein
    Ren, Jian
    IEEE COMMUNICATIONS LETTERS, 2008, 12 (03) : 219 - 221
  • [2] Secure and Privacy-enhanced E-Mail System based on the Concept of Proxies
    Kounelis, Ioannis
    SeadMuftic
    Loeschner, Jan
    2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1405 - 1410
  • [3] E-mail privacy
    不详
    INTECH, 1996, 43 (04) : 33 - 33
  • [4] E-MAIL PRIVACY
    JONES, PBC
    SCIENCE, 1995, 270 (5240) : 1283 - 1284
  • [5] Deniable authenticated encryption for e-mail applications
    Jin C.
    Chen G.
    Yu C.
    Zhao J.
    International Journal of Computers and Applications, 2020, 42 (05): : 429 - 438
  • [6] E-mail Privacy in Question
    Zirkel, Perry A.
    PHI DELTA KAPPAN, 2010, 91 (05) : 76 - 77
  • [7] The myth of E-mail privacy
    Brown, E
    FORTUNE, 1997, 135 (02) : 66 - 66
  • [8] Privacy hazards of e-mail
    Joyce, John
    Scientific Computing and Instrumentation, 2001, 18 (02):
  • [9] Using E-mail Authentication and Disposable E-mail Addressing for Filtering Spam
    Luo, Jia-Ning
    Yang, Ming Hour
    2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, : 356 - +
  • [10] Visual e-mail authentication and identification services: An investigation of the effects on e-mail use
    Wang, Jingguo
    Chen, Rui
    Herath, Tejaswini
    Rao, H. Raghav
    DECISION SUPPORT SYSTEMS, 2009, 48 (01) : 92 - 102