Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm

被引:23
|
作者
Yoon, EJ [1 ]
Ryu, EK [1 ]
Yoo, KY [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
关键词
security; authentication; deniable; Diffie-Hellman;
D O I
10.1016/j.amc.2004.06.096
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Recently, an efficient and non-interactive deniable authentication protocol based on the Diffie-Hellman key distribution protocol is presented by Fan et al. to enable a receiver to identify the source of a given message, but not prove the identity of the sender to a third party. In this paper, we point out that it suffers from an authentication flaw similar to that developed by Lowe to Intruder masquerades as other principals and inquisitor INQ can identify the source of the message unlike their claims. Accordingly, we propose an improved protocol to overcome the weaknesses. (c) 2004 Published by Elsevier Inc.
引用
收藏
页码:274 / 280
页数:7
相关论文
共 50 条
  • [1] A simple deniable authentication protocol based on the Diffie-Hellman algorithm
    Lu, Rongxing
    Lin, Xiaodong
    Cao, Zhenfu
    Qin, Liuquan
    Liang, Xiaohui
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2008, 85 (09) : 1315 - 1323
  • [2] Weakness and solution of deniable authentication protocol based on Diffie-Hellman algorithm
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 401 - 403
  • [3] An improvement of the Diffie-Hellman noncommutative protocol
    Roman'kov, Vitaly
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (01) : 139 - 153
  • [4] Deniable authentication protocol based on Deffie-Hellman algorithm
    Fan, L
    Xu, CX
    Li, JH
    [J]. ELECTRONICS LETTERS, 2002, 38 (14) : 705 - 706
  • [5] Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks
    Hsieh, Wen-Bin
    Leu, Jenq-Shiou
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2014, 14 (10): : 995 - 1006
  • [6] Cryptanalysis on improved Chou et al.'s ID-based deniable authentication protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 87 - +
  • [7] Making the Diffie-Hellman Protocol Identity-Based
    Fiore, Dario
    Gennaro, Rosario
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 165 - +
  • [8] A Hybrid Encryption Algorithm based on RSA and Diffie-Hellman
    Gupta, Shilpi
    Sharma, Jaya
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 55 - 58
  • [9] Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    [J]. INFORMATICA, 2010, 21 (02) : 247 - 258
  • [10] Boneh et al.'s k-element aggregate extraction assumption is equivalent to the Diffie-Hellman assumption
    Coron, JS
    Naccache, D
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 392 - 397