Non-interactive deniable authentication protocol based on factoring

被引:27
|
作者
Lu, RX [1 ]
Cao, ZF [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200030, Peoples R China
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
cryptography; deniable authentication; factoring;
D O I
10.1016/j.csi.2004.09.007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deniable authentication protocol is a new cryptographic authentication protocol that enables a specified receiver to identify the source of a given message, but not prove the identity of the sender to a third party. In recent years, many deniable authentication protocols have been proposed. However, most of these proposed schemes are interactive and less efficient. To our knowledge, only Shao has proposed an efficient non-interactive deniable authentication protocol based on generalized ElGamal signature scheme. Therefore, in this paper, we would like to propose another non-interactive deniable authentication protocol based on factoring. What's more, we also prove it is secure in the random oracle model. (c) 2004 Elsevier B.V All rights reserved.
引用
收藏
页码:401 / 405
页数:5
相关论文
共 50 条
  • [41] Deniable authentication protocol based on elliptic curve cryptography
    Hwang, MS
    Sung, PC
    Tzeng, SF
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
  • [42] An Identity-based Restricted Deniable Authentication Protocol
    Fan, Chengyu
    Zhou, Shijie
    Li, Fagen
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 474 - 478
  • [44] Improvement of an ID-based deniable authentication protocol
    Lin T.-C.
    Lin, Tzu-Chun (lintc@fcu.edu.tw), 2018, Univ. of Electronic Science and Technology of China (16): : 139 - 144
  • [45] A new ID-based deniable authentication protocol
    Lu, Rongxing
    Cao, Zhenfu
    Wang, Shengbao
    Bao, Haiyong
    INFORMATICA, 2007, 18 (01) : 67 - 78
  • [46] An Efficient and Transparent One-Time Authentication Protocol with Non-Interactive Key Scheduling and Update
    Castiglione, Arcangelo
    De Santis, Alfredo
    Castiglione, Aniello
    Palmieri, Francesco
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 351 - 358
  • [47] NON-INTERACTIVE I-PROTOCOL CONSTRUCTION
    Polic, Viktor D.
    METALURGIA INTERNATIONAL, 2012, 17 (12): : 81 - 86
  • [48] Non-interactive manual channel message authentication based on eTCR hash functions
    Reyhanitabar, Mohammad Reza
    Wang, Shuhong
    Safavi-Naini, Reihaneh
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 385 - +
  • [49] Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things
    Martin-Fernandez, Francisco
    Caballero-Gil, Pino
    Caballero-Gil, Candido
    SENSORS, 2016, 16 (01):
  • [50] The Deniability Analysis for a Deniable Authentication Protocol
    Wei, Dawei
    Liu, Wei
    Zhao, Xiufeng
    MECHANICAL ENGINEERING AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2012, 195-196 : 992 - +