ABSTRACT
Deniable authentication is an important security aspect for achieving authentication and privacy. The goal is to allow an intended receiver to identify the origin of a given message without being able to prove sender's identity to a third party. In this paper, we propose a pairing-free identity based non-interactive deniable authentication (IB-NIDA) scheme whose security is based on the difficulty of solving elliptic curve computational Diffie-Hellman problem (ECDH). The proposed scheme undergoes a formal security analysis with random oracle model and standard symbolic model (AVISPA). In addition, the performance analysis shows that our proposed scheme achieves efficiency. Furthermore, such design is applicable for resource constrained mobile devices.
- Dwork, C., Naor, M. and Sahai, A., 2004. Concurrent zero-knowledge. Journal of the ACM (JACM), 51(6), pp. 851--898. Google ScholarDigital Library
- Aumann, Y. and Rabin, M.O., 1998, August. Authentication, enhanced security and error correcting codes. In Annual International Cryptology Conference 299--303. Springer, Berlin, Heidelberg. Google ScholarDigital Library
- Aumann, Y. and Rabin, M., 1998, April. Efficient deniable authentication of long messages. In Int. conf. on theoretical computer science in honor of professor Manuel Blum's 60th birthday 20--24.Google Scholar
- Deng, X., Lee, C.H. and Zhu, H., 2001. Deniable authentication protocols. IEE Proceedings-Computers and Digital Techniques, 148(2), 101--104.Google ScholarCross Ref
- Fan, L., Xu, C.X. and Li, J.H., 2002. Deniable authentication protocol based on Deffie-Hellman algorithm. Electronics letters, 38(14), 705--706.Google Scholar
- Yoon, E.J., Yoo, K.Y., Yeo, S.S. and Lee, C., 2010. Robust deniable authentication protocol. Wireless personal communications, 55(1), 81--90. Google ScholarDigital Library
- Liao, I., 2006. IDentity-based deniable authentication protocol from pairings. In Proceedings of the 10 th IASTED International Conference on Internet and Multimedia Systems and Applications.Google Scholar
- Liu, C.Y., Lee, C.C. and Lin, T.C., 2011. Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme. IJ Network Security, 12(1), 58--60.Google Scholar
- Li, C.T., Wei, C.H., Lee, C.C., Chin, Y.H. and Wang, L.J., 2010. A secure and undeniable billing protocol among charged parties for grid computing environments. International Journal of Innovative Computing, Information and Control, 6(11), 5061--5076.Google Scholar
- Shao, Z., 2004. Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Computer Standards & Interfaces, 26(5), 449--454.Google ScholarCross Ref
- Hsu, C.L., Chuang, Y.H. and Tsai, K.Y., 2008. Novel non-interactive deniable authentication protocol. In The Third Joint Workshop on Information Security. 337--345.Google Scholar
- Shi, Y. and Li, J., 2005. Identity-based deniable authentication protocol. Electronics Letters, 41(5), 241--242.Google ScholarCross Ref
- Lu, R. and Cao, Z., 2005. Non-interactive deniable authentication protocol based on factoring. Computer Standards & Interfaces, 27(4), 401--405. Google ScholarDigital Library
- Lee, W.B., Wu, C.C. and Tsaur, W.J., 2007. A novel deniable authentication protocol using generalized ElGamal signature scheme. Information Sciences, 177(6), 1376--1381. Google ScholarDigital Library
- Cao, T., Lin, D. and Xue, R., 2005, March. An efficient ID-based deniable authentication protocol from pairings. In Advanced Information Networking and Applications, 2005. AINA 2005. 19th International Conference on Vol. 1, 388--391. IEEE. Google ScholarDigital Library
- Chou, J.S., Chen, Y. and Huang, J.C., 2006. A ID-Based Deniable Authentication Protocol on pairings. IACR Cryptology ePrint Archive, 2006,335.Google Scholar
- Wang, B. and Song, Z., 2009. A non-interactive deniable authentication scheme based on designated verifier proofs. Information Sciences, 179(6), 858--865. Google ScholarDigital Library
- Li, F., Xiong, P. and Jin, C., 2014. Identity-based deniable authentication for ad hoc networks. Computing, 96(9), 843--853. Google ScholarDigital Library
- Chen, Y. and Chou, J.S., 2013. ECC-Based Non-Interactive Deniable Authentication with Designated Verifier. IACR Cryptology ePrint Archive, 2013, 783.Google Scholar
- Dolev, D. and Yao, A., 1983. On the security of public key protocols. IEEE Transactions on information theory, 29(2), 198--208. Google ScholarDigital Library
- Barreto, P.S., Lynn, B. and Scott, M., 2003, August. On the selection of pairing-friendly groups. In International Workshop on Selected Areas in Cryptography 17--25. Springer, Berlin, Heidelberg.Google Scholar
- Chung, Y.F., Huang, K.H., Lai, F. and Chen, T.S., 2007. ID-based digital signature scheme on the elliptic curve cryptosystem. Computer Standards & Interfaces, 29(6), 601--604.Google ScholarCross Ref
- Fan, A.W. and Lu, S.X., 2010. An improved elliptic curve digital signature algorithm. In Applied Mechanics and Materials Vol. 34, 1024--1027. Trans Tech Publications.Google ScholarCross Ref
Index Terms
- An ID-based Non-Interactive Deniable Authentication Protocol based on ECC
Recommendations
ID-Based Non-interactive Deniable Authentication Protocol
IAS '09: Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 01Non-interactive deniable authentication protocol is vulnerable to the receiver key-compromise impersonation attack, which are owing to the reason that the authentication message is computed from the receiver’s private and some other public values. ...
A New ID-Based Deniable Authentication Protocol
Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being able to prove the identity of the sender to a third party. Therefore, it can be ...
A non-interactive deniable authentication scheme based on designated verifier proofs
A deniable authentication protocol enables a receiver to identify the source of the given messages but unable to prove to a third party the identity of the sender. In recent years, several non-interactive deniable authentication schemes have been ...
Comments