skip to main content
10.1145/3163058.3163070acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

An ID-based Non-Interactive Deniable Authentication Protocol based on ECC

Authors Info & Claims
Published:24 November 2017Publication History

ABSTRACT

Deniable authentication is an important security aspect for achieving authentication and privacy. The goal is to allow an intended receiver to identify the origin of a given message without being able to prove sender's identity to a third party. In this paper, we propose a pairing-free identity based non-interactive deniable authentication (IB-NIDA) scheme whose security is based on the difficulty of solving elliptic curve computational Diffie-Hellman problem (ECDH). The proposed scheme undergoes a formal security analysis with random oracle model and standard symbolic model (AVISPA). In addition, the performance analysis shows that our proposed scheme achieves efficiency. Furthermore, such design is applicable for resource constrained mobile devices.

References

  1. Dwork, C., Naor, M. and Sahai, A., 2004. Concurrent zero-knowledge. Journal of the ACM (JACM), 51(6), pp. 851--898. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Aumann, Y. and Rabin, M.O., 1998, August. Authentication, enhanced security and error correcting codes. In Annual International Cryptology Conference 299--303. Springer, Berlin, Heidelberg. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Aumann, Y. and Rabin, M., 1998, April. Efficient deniable authentication of long messages. In Int. conf. on theoretical computer science in honor of professor Manuel Blum's 60th birthday 20--24.Google ScholarGoogle Scholar
  4. Deng, X., Lee, C.H. and Zhu, H., 2001. Deniable authentication protocols. IEE Proceedings-Computers and Digital Techniques, 148(2), 101--104.Google ScholarGoogle ScholarCross RefCross Ref
  5. Fan, L., Xu, C.X. and Li, J.H., 2002. Deniable authentication protocol based on Deffie-Hellman algorithm. Electronics letters, 38(14), 705--706.Google ScholarGoogle Scholar
  6. Yoon, E.J., Yoo, K.Y., Yeo, S.S. and Lee, C., 2010. Robust deniable authentication protocol. Wireless personal communications, 55(1), 81--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Liao, I., 2006. IDentity-based deniable authentication protocol from pairings. In Proceedings of the 10 th IASTED International Conference on Internet and Multimedia Systems and Applications.Google ScholarGoogle Scholar
  8. Liu, C.Y., Lee, C.C. and Lin, T.C., 2011. Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme. IJ Network Security, 12(1), 58--60.Google ScholarGoogle Scholar
  9. Li, C.T., Wei, C.H., Lee, C.C., Chin, Y.H. and Wang, L.J., 2010. A secure and undeniable billing protocol among charged parties for grid computing environments. International Journal of Innovative Computing, Information and Control, 6(11), 5061--5076.Google ScholarGoogle Scholar
  10. Shao, Z., 2004. Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Computer Standards & Interfaces, 26(5), 449--454.Google ScholarGoogle ScholarCross RefCross Ref
  11. Hsu, C.L., Chuang, Y.H. and Tsai, K.Y., 2008. Novel non-interactive deniable authentication protocol. In The Third Joint Workshop on Information Security. 337--345.Google ScholarGoogle Scholar
  12. Shi, Y. and Li, J., 2005. Identity-based deniable authentication protocol. Electronics Letters, 41(5), 241--242.Google ScholarGoogle ScholarCross RefCross Ref
  13. Lu, R. and Cao, Z., 2005. Non-interactive deniable authentication protocol based on factoring. Computer Standards & Interfaces, 27(4), 401--405. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Lee, W.B., Wu, C.C. and Tsaur, W.J., 2007. A novel deniable authentication protocol using generalized ElGamal signature scheme. Information Sciences, 177(6), 1376--1381. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Cao, T., Lin, D. and Xue, R., 2005, March. An efficient ID-based deniable authentication protocol from pairings. In Advanced Information Networking and Applications, 2005. AINA 2005. 19th International Conference on Vol. 1, 388--391. IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Chou, J.S., Chen, Y. and Huang, J.C., 2006. A ID-Based Deniable Authentication Protocol on pairings. IACR Cryptology ePrint Archive, 2006,335.Google ScholarGoogle Scholar
  17. Wang, B. and Song, Z., 2009. A non-interactive deniable authentication scheme based on designated verifier proofs. Information Sciences, 179(6), 858--865. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Li, F., Xiong, P. and Jin, C., 2014. Identity-based deniable authentication for ad hoc networks. Computing, 96(9), 843--853. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Chen, Y. and Chou, J.S., 2013. ECC-Based Non-Interactive Deniable Authentication with Designated Verifier. IACR Cryptology ePrint Archive, 2013, 783.Google ScholarGoogle Scholar
  20. Dolev, D. and Yao, A., 1983. On the security of public key protocols. IEEE Transactions on information theory, 29(2), 198--208. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Barreto, P.S., Lynn, B. and Scott, M., 2003, August. On the selection of pairing-friendly groups. In International Workshop on Selected Areas in Cryptography 17--25. Springer, Berlin, Heidelberg.Google ScholarGoogle Scholar
  22. Chung, Y.F., Huang, K.H., Lai, F. and Chen, T.S., 2007. ID-based digital signature scheme on the elliptic curve cryptosystem. Computer Standards & Interfaces, 29(6), 601--604.Google ScholarGoogle ScholarCross RefCross Ref
  23. Fan, A.W. and Lu, S.X., 2010. An improved elliptic curve digital signature algorithm. In Applied Mechanics and Materials Vol. 34, 1024--1027. Trans Tech Publications.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. An ID-based Non-Interactive Deniable Authentication Protocol based on ECC

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCNS '17: Proceedings of the 2017 7th International Conference on Communication and Network Security
      November 2017
      125 pages
      ISBN:9781450353496
      DOI:10.1145/3163058

      Copyright © 2017 ACM

      © 2017 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 November 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader