A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography

被引:4
|
作者
Chuang, Yu-Hao [1 ]
Hsu, Chien-Lung [1 ]
Shu, Wesley [2 ]
Hsu, Kevin C. [2 ]
Liao, Min-Wen [1 ]
机构
[1] Chang Gung Univ, Dept Informat Management, 259 Wen Hwa 1st Rd, Taoyuan 333, Taiwan
[2] Natl Cent Univ, Dept Informat Management, Jhongli 32001, Tao Yuan County, Taiwan
关键词
deniable authentication protocol; privacy; public key infrastructure; elliptic curve cryptography; BILINEAR PAIRINGS; HELLMAN ALGORITHM; SCHEME;
D O I
10.1007/978-3-319-16211-9_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Since the information technology continues to grow and the network applications are getting popular, protecting the privacy of Internet users on the open network becomes a necessary concern. The traditional authentication protocol is not suitable for the requirements of internet security nowadays. That is, it cannot assure that the private information not be revealed during the authentication operation, or be used by malicious terminal service managers for their personal gain in some other business opportunities. Hence, in the dissertation, we propose a deniable authentication protocol based on elliptic curve cryptography (ECC) to satisfy the current public key infrastructure and fulfill the following security requirements of deniable authentication protocols. 1. Each user can prove his/her legitimacy to the designated verifier. 2. The designated verifier cannot prove the identity of the user to the third party even though the verifier provides the testimonials. Moreover, the proposed deniable authentication protocol is suitable for the mobile devices since it only needs limited computation resources.
引用
收藏
页码:183 / 190
页数:8
相关论文
共 50 条
  • [1] Deniable authentication protocol based on elliptic curve cryptography
    Hwang, MS
    Sung, PC
    Tzeng, SF
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
  • [2] A secure non-interactive deniable authentication protocol based on discrete logarithms
    Chuang, Yu-Hao
    Shu, Wesley
    Hsu, Kevin C.
    Hsu, Chien-Lung
    [J]. ICIC Express Letters, Part B: Applications, 2012, 3 (03): : 507 - 512
  • [3] A non-interactive quantum deniable authentication protocol based on asymmetric quantum cryptography
    Shi, Wei-Min
    Zhang, Jan-Biao
    Zhou, Yi-Hua
    Yang, Yu-Guang
    Zhang, Xin-Lan
    [J]. OPTIK, 2016, 127 (20): : 8693 - 8697
  • [4] Non-interactive deniable authentication protocol based on factoring
    Lu, RX
    Cao, ZF
    [J]. COMPUTER STANDARDS & INTERFACES, 2005, 27 (04) : 401 - 405
  • [5] RETRACTED: A Non-interactive Deniable Authentication Protocol based on Elliptic Curve Discrete Logarithm Problem (Retracted Article)
    Shao, Fei
    Meng, Bo
    [J]. 2011 INTERNATIONAL CONFERENCE ON ENERGY AND ENVIRONMENTAL SCIENCE-ICEES 2011, 2011, 11 : 1018 - 1025
  • [6] ID-based non-interactive deniable authentication protocol
    Shi Wei-min
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 479 - 482
  • [7] Secure deniable authentication protocol based on ElGamal cryptography
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 36 - +
  • [8] Non-interactive deniable ring authentication
    Susilo, W
    Mu, Y
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 386 - 401
  • [9] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jong Sung
    [J]. 2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,
  • [10] ID-based Non-interactive Deniable Authentication Protocol from Pairings
    Xin Xiangjun
    Chen Dongsheng
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1077 - 1080