Non-interactive deniable authentication protocol based on factoring

被引:27
|
作者
Lu, RX [1 ]
Cao, ZF [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200030, Peoples R China
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
cryptography; deniable authentication; factoring;
D O I
10.1016/j.csi.2004.09.007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deniable authentication protocol is a new cryptographic authentication protocol that enables a specified receiver to identify the source of a given message, but not prove the identity of the sender to a third party. In recent years, many deniable authentication protocols have been proposed. However, most of these proposed schemes are interactive and less efficient. To our knowledge, only Shao has proposed an efficient non-interactive deniable authentication protocol based on generalized ElGamal signature scheme. Therefore, in this paper, we would like to propose another non-interactive deniable authentication protocol based on factoring. What's more, we also prove it is secure in the random oracle model. (c) 2004 Elsevier B.V All rights reserved.
引用
收藏
页码:401 / 405
页数:5
相关论文
共 50 条
  • [1] Non-interactive deniable authentication protocol based on factoring (vol 27, pg 401, 2005)
    Lu, Rongxing
    Cao, Zhenfu
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) : 275 - 275
  • [2] ID-based non-interactive deniable authentication protocol
    Shi Wei-min
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 479 - 482
  • [3] A secure non-interactive deniable authentication protocol based on discrete logarithms
    Chuang, Yu-Hao
    Shu, Wesley
    Hsu, Kevin C.
    Hsu, Chien-Lung
    ICIC Express Letters, Part B: Applications, 2012, 3 (03): : 507 - 512
  • [4] Non-interactive deniable ring authentication
    Susilo, W
    Mu, Y
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 386 - 401
  • [5] A non-interactive quantum deniable authentication protocol based on asymmetric quantum cryptography
    Shi, Wei-Min
    Zhang, Jan-Biao
    Zhou, Yi-Hua
    Yang, Yu-Guang
    Zhang, Xin-Lan
    OPTIK, 2016, 127 (20): : 8693 - 8697
  • [6] ID-based Non-interactive Deniable Authentication Protocol from Pairings
    Xin Xiangjun
    Chen Dongsheng
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1077 - 1080
  • [7] Non-interactive identity based deniable authentication scheme
    Kuo, Wen-Chung
    Huang, Yu-Chih
    PROCEEDING OF THE SEVENTH INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2008, 7 : 353 - 356
  • [8] An efficient non-interactive deniable authentication protocol with anonymous sender protection
    Hwang, Shin-Jia
    Chao, Chien-Hung
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (03): : 219 - 231
  • [9] A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography
    Chuang, Yu-Hao
    Hsu, Chien-Lung
    Shu, Wesley
    Hsu, Kevin C.
    Liao, Min-Wen
    NEW TRENDS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2015, 598 : 183 - 190
  • [10] Efficient non-interactive deniable authentication protocols
    Qian, HF
    Cao, ZF
    Wang, LC
    Xue, QS
    FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 673 - 679