Weakness and solution of deniable authentication protocol based on Diffie-Hellman algorithm

被引:0
|
作者
Yoon, EJ [1 ]
Ryu, EK [1 ]
Yoo, KY [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
关键词
security; authentication; deniable; Diffie-Hellman;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, an efficient and non-interactive deniable authentication protocol based on the Diffie-Hellman key distribution protocol is presented by Fen et al. to enable a receiver to identify the source of a given message, but not prove the identity of the sender to a third party. In this paper, we point out that it suffers from an authentication flaw similar to that developed by Lowe to Intruder masquerades as other principals and inquisitor INQ can identify the source of the message unlike their claims. Accordingly, we propose an improved protocol to overcome the weaknesses.
引用
收藏
页码:401 / 403
页数:3
相关论文
共 50 条
  • [41] Strongly unforgeable signatures based on computational Diffie-Hellman
    Boneh, Dan
    Shen, Emily
    Waters, Brent
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 229 - 240
  • [42] Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    [J]. INFORMATICA, 2010, 21 (02) : 247 - 258
  • [43] Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation
    Millen, Jonathan
    Shmatikov, Vitaly
    [J]. JOURNAL OF COMPUTER SECURITY, 2005, 13 (03) : 515 - 564
  • [44] Study of security of IPsec based on IPv6 and the Diffie-Hellman algorithm
    Yang, Yao
    Liao, Jianming
    Li, JianPing
    Liu, Hui
    Hao, Yujie
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 1233 - +
  • [45] Implementation of Differential Privacy Using Diffie-Hellman and AES Algorithm
    Mallya, P. V. Vivek Sridhar
    Ajith, Aparna
    Sangeetha, T. R.
    Krishnan, Arya
    Narayanan, Gayathri
    [J]. INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 143 - 152
  • [46] A Novel Authenticated Group Key Agreement Protocol Based on Elliptic Curve Diffie-Hellman
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4611 - 4614
  • [47] Secure Key Exchange Using Enhanced Diffie-Hellman Protocol Based on String Comparison
    Taparia, Ankit
    Panigrahy, Saroj Kumar
    Jena, Sanjay Kumar
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 722 - 726
  • [48] An Efficient Improved Group Key Agreement Protocol Based on Diffie-Hellman Key Exchange
    Yang Guang-ming
    Chen Jin-ming
    Lu Ya-feng
    Ma Da-Ming
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 2, 2010, : 303 - 306
  • [49] Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH)
    Hong, Sunghyuck
    Lee, Sungjin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (01): : 149 - 165
  • [50] Extended Diffie-Hellman protocol based on exponential and multiplication operations over modular arithmetic
    Kumain, Sandeep Chand
    Deshmukh, Maroti
    Singh, Maheep
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2024, 30 (04)