An Identity-based Restricted Deniable Authentication Protocol

被引:3
|
作者
Fan, Chengyu [1 ,2 ]
Zhou, Shijie [2 ]
Li, Fagen [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Sichuan, Peoples R China
[2] Coll Software Southwest Univ, Coll Comp & Informat Sci, Chongqing, Peoples R China
基金
中国国家自然科学基金;
关键词
Bilinear pairings; restricted deniability; KCI attack; SIGNATURE;
D O I
10.1109/ISPA.2009.113
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A deniable authentication allows the receiver to identify the source of the received messages but cannot prove it to any third party. However, the deniability of the content, which is called restricted deniability in this paper, is concerned in electronic voting and some other similar application. At present, most non-interactive deniable authentication protocols cannot resist weaken key-compromise impersonation (W-KCI) attack. To settle this problem, a non-interactive identity-based restricted deniable authentication protocol is proposed. It not only can resist W-KCI attack but also has the properties of communication flexibility. It meets the security requirements such as correctness, restricted deniability as well. Therefore, this protocol can be applied in electronic voting.
引用
收藏
页码:474 / 478
页数:5
相关论文
共 50 条
  • [1] Identity-based deniable authentication protocol
    Shi, Y
    Li, J
    [J]. ELECTRONICS LETTERS, 2005, 41 (05) : 241 - 242
  • [2] A Secure Identity-based Deniable Authentication Protocol for MANETs
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    [J]. PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 91 - 95
  • [3] Identity-based deniable authentication protocol from pairings
    Liao, I-En
    Lee, Cheng-Chi
    Shiang, Wufeng
    Hwang, Min-Shiang
    [J]. PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON INTERNET AND MULTIMEDIA SYSTEMS AND APPLICATIONS, 2006, : 112 - +
  • [4] Cryptanalysis on an Enhanced Identity-based Deniable Authentication Protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    [J]. 2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2008, : 549 - +
  • [5] Identity-based deniable authentication for ad hoc networks
    Li, Fagen
    Xiong, Pan
    Jin, Chunhua
    [J]. COMPUTING, 2014, 96 (09) : 843 - 853
  • [6] Identity-based deniable authentication for ad hoc networks
    Fagen Li
    Pan Xiong
    Chunhua Jin
    [J]. Computing, 2014, 96 : 843 - 853
  • [7] Identity-based authentication protocol for grid
    Li Hongwei
    [J]. Journal of Systems Engineering and Electronics, 2008, (04) : 860 - 865
  • [8] Identity-based authentication protocol for grid
    Li Hongwei
    Sun Shixin
    Yang Haomiao
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (04) : 860 - COVER3
  • [9] A Restricted Quantum Deniable Authentication Protocol Based on GHZ States
    Shi Weimin
    Wang Yanmei
    Li Leilei
    Zhou Yihua
    Yang Yuguang
    Jiang Nan
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (02) : 229 - 233
  • [10] A Novel Identity-based Deniable Authentication Protocol Using Bilinear Pairings for Mobile Ad Hoc Networks
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Hsiao, Kuei-Fang
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2020, 47 (1-4) : 227 - 247