Full and partial deniability for authentication schemes

被引:1
|
作者
Liu, Jiqiang [1 ]
Chen, Xun [1 ]
Han, Zhen [1 ]
机构
[1] Beijing Jiaotong Univ, Dept Comp & Informat Technol, Beijing 100044, Peoples R China
来源
关键词
authentication; deniability; bilinear maps; PROTOCOL;
D O I
10.1007/s11704-010-0365-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deniable authentication is a type of authentication protocol with the special property of deniability. However, there have been several different definitions of deniability in authentication protocols. In this paper, we clarify this issue by defining two types of deniable authentication: In the first type of deniable authentication, the receiver of the authenticated message cannot prove to a third party that the sender has authenticated any message to him. We call this type of deniability full deniability. In the second type of deniable authentication, whilst the receiver can prove to a third party that the sender has authenticated some message to him, but he cannot prove to a third party that the sender has authenticated any particular message to the receiver. We call this type of deniability partial deniability. Note that partial deniability is not implied by full deniability, and that it has applications different from those of full deniability. Consequently, we present two identity-based authentication schemes and prove that one is fully deniable while the other is partially deniable. These two schemes can be useful in different scenarios.
引用
收藏
页码:516 / 521
页数:6
相关论文
共 50 条
  • [1] Full and partial deniability for authentication schemes
    Jiqiang Liu
    Xun Chen
    Zhen Han
    Frontiers of Computer Science in China, 2010, 4 : 516 - 521
  • [2] The Deniability Analysis for a Deniable Authentication Protocol
    Wei, Dawei
    Liu, Wei
    Zhao, Xiufeng
    MECHANICAL ENGINEERING AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2012, 195-196 : 992 - +
  • [3] Composability and On-Line Deniability of Authentication
    Dodis, Yevgeniy
    Katz, Jonathan
    Smith, Adam
    Walfish, Shabsi
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 146 - +
  • [4] A Robust User Authentication Protocol with Anonymity, Deniability, Key Agreement and Efficiency
    Hsu, Chien-Lung
    Chuang, Yu-Hao
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (01): : 127 - 132
  • [5] A Privacy-Preserving Authentication and Key Agreement Scheme with Deniability for IoT
    Zhou, Yousheng
    Liu, Tong
    Tang, Fei
    Wang, Feng
    Tinashe, Magara
    ELECTRONICS, 2019, 8 (04):
  • [6] CARTESIAN AUTHENTICATION SCHEMES
    DESOETE, M
    VEDDER, K
    WALKER, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 476 - 490
  • [7] Secret handshakes: Full dynamicity, deniability and lattice-based design
    An, Zhiyuan
    Pan, Jing
    Wen, Yamin
    Zhang, Fangguo
    THEORETICAL COMPUTER SCIENCE, 2023, 940 : 14 - 35
  • [8] Homomorphic Linear Authentication Schemes from ε-Authentication Codes
    Han, Shuai
    Liu, Shengli
    Zhang, Fangguo
    Chen, Kefei
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 487 - 498
  • [9] Authentication schemes with no verification table
    Chang, YF
    Chang, CC
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 820 - 832
  • [10] A Survey on Authentication Schemes of VANETs
    Jenefa, J.
    Anita, E. A. Mary
    2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,