Skip to main content

Non-interactive Deniable Authentication Protocols

  • Conference paper
Book cover Information Security and Cryptology (Inscrypt 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7537))

Included in the following conference series:

Abstract

This paper gives a security model for non-interactive deniable authentication (NIDA) protocols. This model captures a session-state-reveal attack and a key-compromise-impersonation attack. We analyze some NIDA protocols in the model, and we find that no one is satisfactory. We give a new paradigm to construct an NIDA protocol, which is provably secure in the model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dwork, C., Naor, M., Sahai, A.: Concurrent Zero Knowledge. Journal of the ACM 51(6), 851–898 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  2. Borisov, N., Goldberg, I., Brewer, E.: Off-the-record communication, or, why not to use PGP. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society (WPES 2004), pp. 77–84. ACM, New York (2004)

    Chapter  Google Scholar 

  3. IPSEC Working Group: Design Rationale for IKEv2. INTERNET-DRAFT, draft-ietf-ipsec-ikev2-rationale-00.txt, http://tools.ietf.org/html/draft-ietf-ipsec-ikev2-rationale-00

  4. Shao, Z.: Efficient Deniable Authentication Protocol Based On Generalized Elgamal Signature Scheme. Computer Standards & Interfaces 26(5), 449–454 (2004)

    Article  Google Scholar 

  5. Wang, B., Song, Z.: A non-interactive deniable authentication scheme based on designated receiver proofs. Information Sciences 179(6), 858–865 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  6. Lee, W., Wu, C., Tsaur, W.: A novel authentication protocol using generalized ElGamal signature scheme. Information Sciences 177(6), 1376–1381 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  7. Chou, J., Chen, Y., Huang, J.: A ID-Based Deniable Authentication Protocol on pairings, http://eprint.iacr.org/2006/335

  8. Meng, B.: A secure Non-interactive Deniable Authentication Protocol with Strong Deniability Based on Discrete Logarithm Problem and its Application on Internet Voting Protocol. Information Technology Journal 8(3), 302–309 (2009)

    Article  Google Scholar 

  9. Lu, R., Cao, Z., Wang, S., Bao, H.: A New ID-Based Deniable Authentication Protocol. Informatica 18(1), 67–78 (2007)

    MathSciNet  MATH  Google Scholar 

  10. Susilo, W., Mu, Y.: Non-interactive Deniable Ring Authentication. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 386–401. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  12. Lu, R., Cao, Z.: Non-interactive deniable authentication protocol based on factoring. Computer Standards & Interfaces 27(4), 401–405 (2005)

    Article  Google Scholar 

  13. Lu, R., Cao, Z.: A new deniable authentication protocol from bilinear pairings. Applied Mathematics and Computation 168(2), 954–961 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  14. Qian, H., Cao, Z., Wang, L., Xue, Q.S.: Efficient non-interactive deniable authentication protocols. In: The Fifth International Conference on Computer and Information Technology, CIT 2005, pp. 673–679. IEEE (2005)

    Google Scholar 

  15. Shi, Y., Li, J.: Identity-based deniable authentication protocol. Electronics Letters 41(5), 241–242 (2005)

    Article  MathSciNet  Google Scholar 

  16. Brown, D.: Deniable Authentication with RSA and Multicasting, http://eprint.iacr.org/2005/056

  17. Huang, H., Chang, C.: An efficient deniable authentication protocol. In: International Conference on Cyberworlds, pp. 307–310. IEEE (2005)

    Google Scholar 

  18. Fan, C., Zhou, S., Li, F.: An Identity-based Restricted Deniable Authentication Protocol. In: 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, pp. 474–478. IEEE (2009)

    Google Scholar 

  19. Wu, T., Zhang, W., Liu, Z., Mu, C.: An efficient deniable authentication protocol. In: International Conference on Management and Service Science, MASS 2009, pp. 1–4 (2009)

    Google Scholar 

  20. Xin, X., Chen, D.: A Secure and Efficient Deniable Authentication Protocol. In: WASE International Conference on Information Engineering, ICIE 2009, vol. 2, pp. 172–175 (2009)

    Google Scholar 

  21. Xin, X., Chen, D.: ID-based Non-interactive Deniable Authentication Protocol from Pairings. In: International Conference on E-Business and Information System Security, EBISS 2009, pp. 1–4 (2009)

    Google Scholar 

  22. Wei, S.: ID-based non-interactive deniable authentication protocol. In: Fifth International Conference on Information Assurance and Security, IAS 2009, pp. 479–482 (2009)

    Google Scholar 

  23. Di Raimondo, M., Gennaro, R.: New approaches for deniable authentication. Journal of Cryptology 22(4), 572–615 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  24. Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization. MIT Laboratory for Computer Science Technical Report MIT/LCS/TR-212, MIT, MA (1979)

    Google Scholar 

  25. Li, G., Xin, X., Li, W.: An Enhanced Deniable Authentication Protocol. In: International Conference on Computational Intelligence and Security, CIS 2008, vol. 1, pp. 336–339. IEEE (2008)

    Google Scholar 

  26. Bellare, M., Neven, G.: Multi-Signatures in the Plain Public-Key Model and a General Forking Lemma. In: Proceedings of the 13th Association for Computing Machinery (ACM) Conference on Computer and Communications Security (CCS), pp. 390–399. ACM, Alexandria (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tian, H., Chen, X., Jiang, Z. (2012). Non-interactive Deniable Authentication Protocols. In: Wu, CK., Yung, M., Lin, D. (eds) Information Security and Cryptology. Inscrypt 2011. Lecture Notes in Computer Science, vol 7537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34704-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34704-7_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34703-0

  • Online ISBN: 978-3-642-34704-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics