Skip to main content

Privacy-Enhanced Deniable Authentication E-Mail Service

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 194))

Abstract

E-mail brings us lots of conveniences. Especially with help of PGP and S/MIME, it gives both confidentiality and message/origin authentication. However, in some cases for strong privacy, a message sender will not want to let others know even the fact that he sent a message to a recipient. Very recently, Harn and Ren proposed a fully deniable authentication scheme for E-mail where a sender can repudiate his or her signature. In this paper, however, their deniable authentication scheme is proved not to be fully deniable. To resolve this deniability problem, we suggest a designated verifier signature scheme to support strong privacy, and construct a privacy-enhanced deniable authentication E-mail scheme using the designated verifier signature scheme. Compared with the Harn and Ren’s scheme, the proposed scheme has a simple cryptographic structure and can be easily realized with the existing secure E-mail systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S/MIME: Secure Multipuepose Internet Mail Extensions, http://www.rsasecurity.com/standards/smime/

  2. OpenPGP: An Open Specification for Pretty Good Privacy, http://www.ietf.org/html.charters/openpgp-charter.html

  3. Harn, L., Ren, J.: Design of Fully Deniable Authentication Service for E-mail Applications. IEEE Communications Letters 12(3), 219–221 (2008)

    Article  Google Scholar 

  4. Jakobsson, M., Sako, K., Impagliazzo, R.: Designated Verifier Proofs and Their Applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  5. Saeednia, S., Kramer, S., Markovitch, O.: An Efficient Strong Designated Verifier Signature Scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 40–54. Springer, Heidelberg (2004)

    Google Scholar 

  6. Dolev, D., Dwork, C., Naor, M.: Non-malleable Cryptography. SIAM Journal on Computing 30(2), 391–437 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  7. Rackoff, C., Simon, D.: Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433–444. Springer, Heidelberg (1992)

    Google Scholar 

  8. Fujisaki, E., Okamoto, T., Pointcheval, D., Stern, J.: RSA-OAEP is secure under the RSA assumption. J. of Cryptology 17(2), 81–104 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  9. Sun, H., Hsieh, B., Hwang, H.: Secure E-mail Protocols Providing Perfect Forward Secrecy. IEEE Communications Letters 9(1), 58–60 (2005)

    Google Scholar 

  10. Dent, A.W.: Flaws in an E-mail Protocol of Sun, Hsieh, and Hwang. IEEE Communications Letters 9(8), 7180–7719 (2005)

    Article  Google Scholar 

  11. Kim, B.H., Koo, J.H., Lee, D.H.: Robust E-mail Protocols with Perfect Forward Secrecy. IEEE Communications Letters 10(6), 510–512 (2006)

    Article  Google Scholar 

  12. Yoon, E.J., Yoo, K.Y.: Cryptanalysis of Robust E-mail Protocols with Perfect Forward Secrecy. IEEE Communications Letters 11(56), 372–374 (2007)

    Article  Google Scholar 

  13. Aumann, Y., Rabin, M.O.: Authentication, enhanced security and error correcting codes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 299–303. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  14. Jakobsson, M., Sako, K., Impagliazzo, R.: Designated Verifier Proofs and their Applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  15. Huang, X., Susilo, W., Mu, Y., Zhang, F.: Short (Identity-Based) Strong Designated Verifier Signature Schemes. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds.) ISPEC 2006. LNCS, vol. 3903, pp. 214–225. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  16. Laguillaumie, F., Vergnaud, D.: Designated Verifiers Signature: Anonymity and Efficient Construction from any Bilinear Map. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 105–119. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  17. Laguillaumie, F., Vergnaud, D.: Multi-designated Verifiers Signatures. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 495–507. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  18. Zhang, J., Mao, J.: A Novel ID-Based Designated Verifier Signature Scheme. Information Sciences 178, 733–766 (2008)

    MathSciNet  MATH  Google Scholar 

  19. Rivest, R., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  20. Saeednia, S., Kramer, S., Markovitch, O.: An Efficient Strong Designated Verifier Signature Scheme. In: Yazıcı, A., Şener, C. (eds.) ISCIS 2003. LNCS, vol. 2869, pp. 40–54. Springer, Heidelberg (2003)

    Google Scholar 

  21. Susilo, W., Zhang, F., Mu, Y.: Identity-based Strong Designated Verifier Signature Schemes. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 313–324. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  22. Cramer, R., Shoup, V.: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack. SIAM Journal on Computing 33(1), 167–226 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  23. Bender, A., Katz, J., Morselli, R.: Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 60–79. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  24. Lee, J., Chang, J.K., Lee, D.H.: Forgery attacks on Kang et al.’s Identity-Based Strong Designated Verifier Signature Scheme and its improvement with security proof. Computers and Electrical Engineering 35, 49–53 (2009)

    Article  MATH  Google Scholar 

  25. Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ki, J., Yeong Hwang, J., Nyang, D., Hoon Lee, D., Lim, J. (2011). Privacy-Enhanced Deniable Authentication E-Mail Service. In: Ariwa, E., El-Qawasmeh, E. (eds) Digital Enterprise and Information Systems. DEIS 2011. Communications in Computer and Information Science, vol 194. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22603-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22603-8_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22602-1

  • Online ISBN: 978-3-642-22603-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics