Privacy-Enhanced Deniable Authentication E-Mail Service

被引:0
|
作者
Ki, JuHee [1 ]
Hwang, Jung Yeong [2 ]
Nyang, DaeHun [3 ]
Lee, Dong Hoon [4 ]
Lim, Jongin [4 ]
机构
[1] KEIT, Informat Secur PD Team, Taejon, South Korea
[2] ETRI, Knowledge based Informat Secur Dept, Taejon, South Korea
[3] Inha Univ, Informat Secur Res Lab, Incheon, South Korea
[4] Korea Univ, CIST, Seoul, South Korea
关键词
E-mail; authentication; Deniable Authentication; Strong Designated Verifier Signature; Anonymity; PROTOCOLS; PERFECT; SECURE; SIGNATURES; DESIGN;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
E-mail brings us lots of conveniences. Especially with help of PGP and S/MIME, it gives both confidentiality and message/origin authentication. However, in some cases for strong privacy, a message sender will not want to let others know even the fact that he sent a message to a recipient. Very recently, Ham and Ren proposed a fully deniable authentication scheme for E-mail where a sender can repudiate his or her signature. In this paper, however, their deniable authentication scheme is proved not to be fully deniable. To resolve this deniability problem, we suggest a designated verifier signature scheme to support strong privacy, and construct a privacy-enhanced deniable authentication E-mail scheme using the designated verifier signature scheme. Compared with the Ham and Ren's scheme, the proposed scheme has a simple cryptographic structure and can be easily realized with the existing secure E-mail systems.
引用
收藏
页码:16 / +
页数:3
相关论文
共 50 条
  • [31] On the security of a certified e-mail scheme with temporal authentication
    Shao, MH
    Zhou, JY
    Wang, GL
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 3, 2005, 3482 : 701 - 710
  • [32] E-mail authentication is here, but has it arrived yet?
    Lawton, G
    COMPUTER, 2005, 38 (11) : 17 - 19
  • [33] Privacy-Enhanced Anonymous and Deniable Post-quantum X3DH
    Chen, Kaiming
    Miyaji, Atsuko
    Wang, Yuntao
    SCIENCE OF CYBER SECURITY, SCISEC 2023, 2023, 14299 : 157 - 177
  • [34] A NEW PRIVACY-ENHANCED AUTHENTICATION SCHEME FOR WIRELESS MESH NETWORKS
    Feng, Yong
    Fan, Ming-Yu
    Liu, Chang-Ping
    2008 INTERNATIONAL CONFERENCE ON APPERCEIVING COMPUTING AND INTELLIGENCE ANALYSIS (ICACIA 2008), 2008, : 265 - 269
  • [36] Identity-based deniable authenticated encryption and its application to e-mail system
    Li, Fagen
    Zheng, Zhaohui
    Jin, Chunhua
    TELECOMMUNICATION SYSTEMS, 2016, 62 (04) : 625 - 639
  • [37] Identity-based deniable authenticated encryption and its application to e-mail system
    Fagen Li
    Zhaohui Zheng
    Chunhua Jin
    Telecommunication Systems, 2016, 62 : 625 - 639
  • [38] Monitoring employee's e-mail: An e-privacy concern
    Guo Yimei
    Luo Ying
    Proceedings of the 3rd International Conference on Innovation & Management, Vols 1 and 2, 2006, : 1098 - 1101
  • [39] Key Exchange and E-Mail Authentication Using Lagrange Interpolation
    Kumari, P. Lalitha Surya
    Sekhar, G. Soma
    DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT-2K19, 2020, 1079 : 253 - 264
  • [40] An Enhanced Deniable Authentication Protocol
    Li Gang
    Xin Xiangjun
    Li Wei
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 336 - +