Efficient ID-based deniable authentication protocols

被引:0
|
作者
Shi, Yijuan [1 ]
Li, Jianhua [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200030, Peoples R China
关键词
deniable authentication; ID-based cryptography; bilinear pairing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identity-based interactive and non-interactive deniable authentication protocols are presented to enable a receiver to identify the source of a given message, but not prove the identity of the sender to a third party. The two protocols are more efficient than the existing deniable authentication protocols because they provide authentication without using the certificates. Furthermore, the protocols can withstand the impersonation attack and any third party cannot impersonate the intended receiver to identify the source of a given message. The security of the two protocols is analyzed heuristically under the assumption of the BDH problem.
引用
收藏
页码:321 / 324
页数:4
相关论文
共 50 条
  • [1] An efficient ID-based deniable authentication protocol from pairings
    Cao, TJ
    Lin, DD
    Xue, R
    [J]. 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 388 - 391
  • [2] Improvement of an ID-Based Deniable Authentication Protocol
    Tzu-Chun Lin
    [J]. Journal of Electronic Science and Technology., 2018, 16 (02) - 144
  • [5] ID-based Deniable Threshold Ring Authentication
    Jin, Chunhua
    Xu, Chunxiang
    Jiang, Linzhi
    Li, Fagen
    [J]. 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1779 - 1784
  • [6] A new ID-based deniable authentication protocol
    Lu, Rongxing
    Cao, Zhenfu
    Wang, Shengbao
    Bao, Haiyong
    [J]. INFORMATICA, 2007, 18 (01) : 67 - 78
  • [7] An enhanced ID-based deniable authentication protocol on pairings
    Lim, Meng-Hui
    Lee, Sanggon
    Park, Youngho
    Lee, Hoonjae
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 1008 - 1017
  • [8] ID-based non-interactive deniable authentication protocol
    Shi Wei-min
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 479 - 482
  • [9] Authentication Protocols and Authentication on the Base of PKI and ID-based
    Min Thant
    Zaw, Than Myo
    [J]. 2018 WAVE ELECTRONICS AND ITS APPLICATION IN INFORMATION AND TELECOMMUNICATION SYSTEMS (WECONF), 2018,
  • [10] ID-based deniable ring authentication with constant-size signature
    Wang L.
    Zhang G.
    Ma C.
    [J]. Frontiers of Computer Science in China, 2008, 2 (1): : 106 - 112