Round-Optimal Deniable Ring Authentication in the Presence of Big Brother

被引:0
|
作者
Dowsley, Rafael [1 ]
Hanaoka, Goichiro [2 ]
Imai, Hideki [2 ]
Nascimento, Anderson C. A. [1 ]
机构
[1] Univ Brasilia, Dept Elect Engn, Campus Univ Darcy Ribeiro, BR-70910900 Brasilia, DF, Brazil
[2] Natl Inst Adv Ind Sci & Technol, Chyioda-ku, Chyioda, Tokyo 101-0021, Japan
来源
关键词
Deniable Ring Authentication; Broadcast Encryption; Big Brother; COMPUTATIONAL DIFFIE-HELLMAN; PUBLIC-KEY ENCRYPTION; ZERO-KNOWLEDGE PROOF; BROADCAST ENCRYPTION; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work we propose a Deniable Ring Authentication scheme secure against a powerful Big Brother type of adversary and yielding an optimal number of communication rounds. Our scheme is based on an infra-structure assumption: the existence of verifiable Broadcast Encryption. Particularly, our solution can be instantiated by using the Broadcast Encryption protocol of Boneh, Gentry and Waters (CRYPTO 2005), resulting in a Deniable Ring Authentication protocol with constant message size.
引用
收藏
页码:307 / +
页数:3
相关论文
共 50 条
  • [1] Generic transformation from broadcast encryption to round-optimal deniable ring authentication
    Hara, Keisuke
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Tanaka, Keisuke
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (02) : 277 - 316
  • [2] Generic transformation from broadcast encryption to round-optimal deniable ring authentication
    Keisuke Hara
    Takahiro Matsuda
    Goichiro Hanaoka
    Keisuke Tanaka
    [J]. Designs, Codes and Cryptography, 2022, 90 : 277 - 316
  • [3] Deniable ring authentication
    Naor, M
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 481 - 498
  • [4] Quantum-Safe Round-Optimal Password Authentication for Mobile Devices
    Li, Zengpeng
    Wang, Ding
    Morais, Eduardo
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1885 - 1899
  • [5] Round-Optimal Byzantine Agreement
    Ghinea, Diana
    Goyal, Vipul
    Chen-Da Liu-Zhang
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 96 - 119
  • [6] Deniable ring authentication revisited
    Susilo, W
    Mu, Y
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 149 - 163
  • [7] Non-interactive deniable ring authentication
    Susilo, W
    Mu, Y
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 386 - 401
  • [8] Round-optimal contributory conference key agreement
    Boyd, C
    Nieto, JMG
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 161 - 174
  • [9] Round-optimal and efficient verifiable secret sharing
    Fitzi, Matthias
    Garay, Juan
    Gollakota, Shyamnath
    Rangan, C. Pandu
    Srinathan, Karman
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 329 - 342
  • [10] Deniable Ring Authentication Based on Projective Hash Functions
    Zeng, Shengke
    Mu, Yi
    Yang, Guomin
    He, Mingxing
    [J]. PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 127 - 143