The Community for Technology Leaders
Computer and Information Technology, International Conference on (2005)
Shanghai, China
Sept. 21, 2005 to Sept. 23, 2005
ISBN: 0-7695-2432-X
pp: 673-679
Qingshui Xue , Shanghai Jiao Tong University
Lichen Wang , Shanghai Jiao Tong University
Haifeng Qian , Shanghai Jiao Tong University
Zhenfu Cao , Shanghai Jiao Tong University
<p>Deniable authentication protocol is an authentication protocol that allows a sender to authenticate a message for a receiver, in a way that the receiver cannot convince a third party that such authentication ever took place.</p> <p>In recent years, due to the popularity of Internet and its special property, many deniable authentication protocols have been proposed. However, most of these proposed schemes are interactive and less efficient. To our knowledge, Shao has proposed an efficient non-interactive deniable authentication protocol based on generalized ElGamal signature scheme without security proof. Lu et al have proposed a deniable authentication also, however, the protocol suffers from the receiver?s attack who once interacts with the sender.</p> <p>For the reason above, we would like to propose a generic method to construct efficient non-interactive deniable authentication protocols from any trapdoor permutations. Using RSA trapdoor permutations we introduce a new digital signature with tight security and use it to construct a concrete deniable authentication protocol. Concentrated on security problem we prove the protocol secure in random oracle. We also believe that the protocol is much efficient and practical in application with non-interactive property.</p>
Authentication, Deniablity, Trapdoor permutations, Impersonation attack, Digital signature, Tight security, MAC.
Qingshui Xue, Lichen Wang, Haifeng Qian, Zhenfu Cao, "Efficient Non-interactive Deniable Authentication Protocols", Computer and Information Technology, International Conference on, vol. 00, no. , pp. 673-679, 2005, doi:10.1109/CIT.2005.109
86 ms
(Ver 3.3 (11022016))