A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography

被引:4
|
作者
Chuang, Yu-Hao [1 ]
Hsu, Chien-Lung [1 ]
Shu, Wesley [2 ]
Hsu, Kevin C. [2 ]
Liao, Min-Wen [1 ]
机构
[1] Chang Gung Univ, Dept Informat Management, 259 Wen Hwa 1st Rd, Taoyuan 333, Taiwan
[2] Natl Cent Univ, Dept Informat Management, Jhongli 32001, Tao Yuan County, Taiwan
关键词
deniable authentication protocol; privacy; public key infrastructure; elliptic curve cryptography; BILINEAR PAIRINGS; HELLMAN ALGORITHM; SCHEME;
D O I
10.1007/978-3-319-16211-9_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Since the information technology continues to grow and the network applications are getting popular, protecting the privacy of Internet users on the open network becomes a necessary concern. The traditional authentication protocol is not suitable for the requirements of internet security nowadays. That is, it cannot assure that the private information not be revealed during the authentication operation, or be used by malicious terminal service managers for their personal gain in some other business opportunities. Hence, in the dissertation, we propose a deniable authentication protocol based on elliptic curve cryptography (ECC) to satisfy the current public key infrastructure and fulfill the following security requirements of deniable authentication protocols. 1. Each user can prove his/her legitimacy to the designated verifier. 2. The designated verifier cannot prove the identity of the user to the third party even though the verifier provides the testimonials. Moreover, the proposed deniable authentication protocol is suitable for the mobile devices since it only needs limited computation resources.
引用
收藏
页码:183 / 190
页数:8
相关论文
共 50 条
  • [21] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Negin Dinarvand
    Hamid Barati
    [J]. Wireless Networks, 2019, 25 : 415 - 428
  • [22] Non-interactive deniable authentication protocol based on factoring (vol 27, pg 401, 2005)
    Lu, Rongxing
    Cao, Zhenfu
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) : 275 - 275
  • [23] Elliptic curve cryptography based wireless authentication protocol
    Yongliang, Liu
    Gao, Wen
    Yao, Hongxun
    Yu, Xinghua
    [J]. International Journal of Network Security, 2007, 5 (03) : 327 - 337
  • [24] A non-interactive deniable authentication scheme based on designated verifier proofs
    Wang, Bin
    Song, ZhaoXia
    [J]. INFORMATION SCIENCES, 2009, 179 (06) : 858 - 865
  • [25] A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
    Kumar, Vinod
    Ahmad, Musheer
    Kumari, Adesh
    [J]. TELEMATICS AND INFORMATICS, 2019, 38 : 100 - 117
  • [26] On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    Chen, Long-Sheng
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 88 - 91
  • [27] A secure non-interactive chaotic maps-based deniable authentication scheme with privacy protection in standard model
    Zhu, Hongfeng
    Zhang, Yan
    [J]. Journal of Computers (Taiwan), 2018, 29 (03) : 109 - 120
  • [28] A Roaming Authentication Protocol based on Elliptic Curve Cryptography in IOV
    Shen Cen
    Mu Haibing
    [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 400 - 404
  • [29] A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography
    Liu, Ya-Li
    Qin, Xiao-Lin
    Wang, Chao
    Li, Bo-Han
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (11) : 2880 - 2887
  • [30] An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes
    Youn, Taek-Young
    Lee, Changhoon
    Park, Young-Ho
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 353 - 357