An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes

被引:4
|
作者
Youn, Taek-Young [2 ]
Lee, Changhoon [3 ]
Park, Young-Ho [1 ]
机构
[1] Sejong Cyber Univ, Dept Informat Secur Syst, Seoul, South Korea
[2] Korea Univ, Grad Sch Informat Management & Secur, Seoul, South Korea
[3] Hanshin Univ, Sch Comp Engn, Osan, South Korea
关键词
Deniable authentication; Trapdoor commitment; Provable security; PROTOCOL; SECURITY;
D O I
10.1016/j.comcom.2010.03.028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deniable authentication scheme is one of useful tools for secure communications. The scheme allows a sender to prove the authenticity of a message to a specified receiver without permitting the receiver to prove that the message was authenticated by the sender. Non-interactive schemes are more attractive than interactive schemes in terms of communication overhead, and thus several non-interactive deniable authentication scheme have been proposed. In this paper, we propose an efficient non-interactive deniable authentication scheme based on trapdoor commitment scheme. We construct an efficient trapdoor commitment scheme which provides very efficient commitment evaluation operation. Then we design an efficient non-interactive deniable authentication scheme by using the trapdoor commitment scheme. We also prove the security of our scheme under firmly formalized security model. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:353 / 357
页数:5
相关论文
共 50 条
  • [1] Non-interactive identity based deniable authentication scheme
    Kuo, Wen-Chung
    Huang, Yu-Chih
    [J]. PROCEEDING OF THE SEVENTH INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2008, 7 : 353 - 356
  • [2] Efficient non-interactive deniable authentication protocols
    Qian, HF
    Cao, ZF
    Wang, LC
    Xue, QS
    [J]. FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 673 - 679
  • [3] A non-interactive deniable authentication scheme based on designated verifier proofs
    Wang, Bin
    Song, ZhaoXia
    [J]. INFORMATION SCIENCES, 2009, 179 (06) : 858 - 865
  • [4] Non-interactive deniable ring authentication
    Susilo, W
    Mu, Y
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 386 - 401
  • [5] Non-interactive deniable authentication protocol based on factoring
    Lu, RX
    Cao, ZF
    [J]. COMPUTER STANDARDS & INTERFACES, 2005, 27 (04) : 401 - 405
  • [6] A Non-interactive Deniable and Negative Authentication Scheme in Random Oracle Model
    Zhu, Hongfeng
    Liu, Tianhua
    Geng, Shuai
    Zhang, Yuanle
    Wang, Liwei
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (03): : 645 - 653
  • [7] ID-based non-interactive deniable authentication protocol
    Shi Wei-min
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 479 - 482
  • [8] An efficient non-interactive deniable authentication protocol with anonymous sender protection
    Hwang, Shin-Jia
    Chao, Chien-Hung
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (03): : 219 - 231
  • [9] A secure non-interactive deniable authentication protocol based on discrete logarithms
    Chuang, Yu-Hao
    Shu, Wesley
    Hsu, Kevin C.
    Hsu, Chien-Lung
    [J]. ICIC Express Letters, Part B: Applications, 2012, 3 (03): : 507 - 512
  • [10] Cryptanalysis of a non-interactive deniable ring signature scheme
    Huiwen Jia
    Chunming Tang
    [J]. International Journal of Information Security, 2021, 20 : 103 - 112