Abstract
Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. This paper describes a secure non-interactive deniable authentication protocol using ECDSA signature scheme. The security of the protocol is based on difficulty of breaking Elliptic Curve Discrete Logarithm Problem. It can be implemented in low power and small processor mobile devices such as smart card, PDA etc which work in low power and small processor.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aumann, Y., Rabin, M.O.: Efficient Deniable Authentication of Long Messages. In: Int. Conf. on Theoretical Computer Science in Honour of Professor Manuel Blum’s 60th Birthday (1998), http://www.cs.cityu.edu.hk/dept/video.html
Boyd, C., Mao, W., Paterson, K.G.: Deniable authenticated key establishment for Internet protocols. In: 11th International Workshop on Security Protocols, Cambridge (UK) (April 2003)
Dwork, C., Naor, M., Sahai, A.: Concurrent zero-knowledge. In: Proc. 30th ACM STOC 1998, Dallas TX, USA, pp. 409–418 (1998)
Chou, J.S., Chen, Y.L., Huang, J.C.: A ID-Based Deniable Authentication Protocol on pairings. Cryptology ePrint Archive: Report (335) (2006)
Chou, J.S., Chen, Y.L., Yang, M.D.: Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols. Cryptology ePrint Archive: Report (451) (2005)
Kar, J.P., Majhi, B.: A Novel Deniable Authentication Protocol based on Diffie-Hellman Algorithm using Pairing techniques. In: ACM International Conference on Communication, Computing and Security (ICCCS 2011), India, pp. 493–498 (2011)
Deng, X., Lee, Lee, C.H., Zhu, H.: Deniable authentication protocols. IEEE Proc. Comput. Digit. Tech. 148(2), 101–104 (2001)
Dwork, C., Naor, M., Sahai, A.: Concurrent zero-knowledge. In: Proc. 30th ACM STOC 1998, Dallas TX, USA, pp. 409–418 (1998)
Deng, X., Lee, C.H., Zhu, H.: Deniable authentication protocols. IEE Proceedings. Computers and Digital Techniques 148, 101–104 (2001)
Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Improvement of Fan et al.’s Deniable Authentication Protocol based on Diffie-Hellman Algorithm. Applied Mathematics and Computation 167(1), 274–280 (2005)
Zhu, R.W., Wong, D.S., Lee, C.H.: Cryptanalysis of a Suite of Deniable Authentication Protocols. IEEE Communication Letter 10(6), 504–506 (2006)
Koblitz, N.: A course in Number Theory and Cryptography, 2nd edn. Springer, Heidelberg (1994)
Rosen, K.H.: Elementary Number Theory in Science and Communication, 2nd edn. Springer, Berlin (1986)
Menezes, A., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)
Certicom ECC Challenge and The Elliptic Curve Cryptosystem, http://www.certicom.com/index.php
Aumann, Y., Rabin, M.: Authentication, enhanced security and error correcting codes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 299–303. Springer, Heidelberg (1998)
Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. In: Cryptology ePrint Archive: Report 2004/332, http://eprint.iacr.org/2004/332
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kar, J. (2011). Non-interactive Deniable Authentication Protocol Using Generalized ECDSA Signature Scheme. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Information Security and Assurance. ISA 2011. Communications in Computer and Information Science, vol 200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23141-4_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-23141-4_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23140-7
Online ISBN: 978-3-642-23141-4
eBook Packages: Computer ScienceComputer Science (R0)