Full and partial deniability for authentication schemes

被引:1
|
作者
Liu, Jiqiang [1 ]
Chen, Xun [1 ]
Han, Zhen [1 ]
机构
[1] Beijing Jiaotong Univ, Dept Comp & Informat Technol, Beijing 100044, Peoples R China
来源
关键词
authentication; deniability; bilinear maps; PROTOCOL;
D O I
10.1007/s11704-010-0365-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deniable authentication is a type of authentication protocol with the special property of deniability. However, there have been several different definitions of deniability in authentication protocols. In this paper, we clarify this issue by defining two types of deniable authentication: In the first type of deniable authentication, the receiver of the authenticated message cannot prove to a third party that the sender has authenticated any message to him. We call this type of deniability full deniability. In the second type of deniable authentication, whilst the receiver can prove to a third party that the sender has authenticated some message to him, but he cannot prove to a third party that the sender has authenticated any particular message to the receiver. We call this type of deniability partial deniability. Note that partial deniability is not implied by full deniability, and that it has applications different from those of full deniability. Consequently, we present two identity-based authentication schemes and prove that one is fully deniable while the other is partially deniable. These two schemes can be useful in different scenarios.
引用
收藏
页码:516 / 521
页数:6
相关论文
共 50 条
  • [21] A Comprehensive Study on Multifactor Authentication Schemes
    Abhishek, Kumar
    Roshan, Sahana
    Kumar, Prabhat
    Ranjan, Rajeev
    ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 2, 2013, 177 : 561 - +
  • [22] The role of arbiters in asymmetric authentication schemes
    Hanaoka, G
    Shikata, J
    Hanaoka, Y
    Imai, H
    INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 428 - 441
  • [23] New encoding schemes for quantum authentication
    García-Fernández, P
    Fernández-Martínez, E
    Pérez, E
    Santos, DJ
    QUANTUM INFORMATION & COMPUTATION, 2005, 5 (01) : 1 - 12
  • [24] Content Authentication Schemes for Digital Images
    Antonio Mendoza, Jose
    Cruz, Clara
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    2008 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE 2008), 2008, : 224 - 229
  • [25] Password authentication schemes on a quantum computer
    Wang, Sherry
    Adams, Carlisle
    Broadbent, Anne
    2021 IEEE INTERNATIONAL CONFERENCE ON QUANTUM COMPUTING AND ENGINEERING (QCE 2021) / QUANTUM WEEK 2021, 2021, : 346 - 350
  • [26] Post-Quantum Authentication Schemes
    Mendiola, Mark A.
    Gillis, James T.
    Binder, Andrew J.
    Haddad, Ranwa
    PROCEEDINGS OF THE 33RD INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2020), 2020, : 3812 - 3825
  • [27] Mutual Authentication in Electronic Voting Schemes
    Augoye, Voke
    Tomlinson, Allan
    2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, : 380 - 381
  • [28] PERFECT AND ESSENTIALLY PERFECT AUTHENTICATION SCHEMES
    BEUTELSPACHER, A
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 304 : 167 - 170
  • [29] Authentication codes based on association schemes
    Song, Y
    Kurosawa, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (01): : 126 - 130
  • [30] Authentication Schemes for Wireless Sensor Networks
    Tajeddine, Ayman
    Kayssi, Ayman
    Chehab, Ali
    Elhajj, Imad
    2014 17TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (MELECON), 2014, : 367 - 372