Weakness and solution of deniable authentication protocol based on Diffie-Hellman algorithm

被引:0
|
作者
Yoon, EJ [1 ]
Ryu, EK [1 ]
Yoo, KY [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
关键词
security; authentication; deniable; Diffie-Hellman;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, an efficient and non-interactive deniable authentication protocol based on the Diffie-Hellman key distribution protocol is presented by Fen et al. to enable a receiver to identify the source of a given message, but not prove the identity of the sender to a third party. In this paper, we point out that it suffers from an authentication flaw similar to that developed by Lowe to Intruder masquerades as other principals and inquisitor INQ can identify the source of the message unlike their claims. Accordingly, we propose an improved protocol to overcome the weaknesses.
引用
收藏
页码:401 / 403
页数:3
相关论文
共 50 条
  • [1] A simple deniable authentication protocol based on the Diffie-Hellman algorithm
    Lu, Rongxing
    Lin, Xiaodong
    Cao, Zhenfu
    Qin, Liuquan
    Liang, Xiaohui
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2008, 85 (09) : 1315 - 1323
  • [2] Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (01) : 274 - 280
  • [3] The Diffie-Hellman protocol
    Maurer, UM
    Wolf, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 147 - 171
  • [4] An Alternative Diffie-Hellman Protocol
    Jarpe, Eric
    [J]. CRYPTOGRAPHY, 2020, 4 (01) : 1 - 10
  • [5] Deniable authentication protocol based on Deffie-Hellman algorithm
    Fan, L
    Xu, CX
    Li, JH
    [J]. ELECTRONICS LETTERS, 2002, 38 (14) : 705 - 706
  • [6] A Quantum Diffie-Hellman Protocol
    Subramaniam, Pranav
    Parakh, Abhishek
    [J]. 2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, : 523 - 524
  • [7] Diffie-Hellman Protocol as a Symmetric Cryptosystem
    Burda, Karel
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (07): : 33 - 37
  • [8] Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks
    Hsieh, Wen-Bin
    Leu, Jenq-Shiou
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2014, 14 (10): : 995 - 1006
  • [9] Making the Diffie-Hellman Protocol Identity-Based
    Fiore, Dario
    Gennaro, Rosario
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 165 - +
  • [10] An improvement of the Diffie-Hellman noncommutative protocol
    Roman'kov, Vitaly
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (01) : 139 - 153