Abstract
This paper gives a security model for non-interactive deniable authentication (NIDA) protocols. This model captures a session-state-reveal attack and a key-compromise-impersonation attack. We analyze some NIDA protocols in the model, and we find that no one is satisfactory. We give a new paradigm to construct an NIDA protocol, which is provably secure in the model.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Dwork, C., Naor, M., Sahai, A.: Concurrent Zero Knowledge. Journal of the ACM 51(6), 851–898 (2004)
Borisov, N., Goldberg, I., Brewer, E.: Off-the-record communication, or, why not to use PGP. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society (WPES 2004), pp. 77–84. ACM, New York (2004)
IPSEC Working Group: Design Rationale for IKEv2. INTERNET-DRAFT, draft-ietf-ipsec-ikev2-rationale-00.txt, http://tools.ietf.org/html/draft-ietf-ipsec-ikev2-rationale-00
Shao, Z.: Efficient Deniable Authentication Protocol Based On Generalized Elgamal Signature Scheme. Computer Standards & Interfaces 26(5), 449–454 (2004)
Wang, B., Song, Z.: A non-interactive deniable authentication scheme based on designated receiver proofs. Information Sciences 179(6), 858–865 (2009)
Lee, W., Wu, C., Tsaur, W.: A novel authentication protocol using generalized ElGamal signature scheme. Information Sciences 177(6), 1376–1381 (2007)
Chou, J., Chen, Y., Huang, J.: A ID-Based Deniable Authentication Protocol on pairings, http://eprint.iacr.org/2006/335
Meng, B.: A secure Non-interactive Deniable Authentication Protocol with Strong Deniability Based on Discrete Logarithm Problem and its Application on Internet Voting Protocol. Information Technology Journal 8(3), 302–309 (2009)
Lu, R., Cao, Z., Wang, S., Bao, H.: A New ID-Based Deniable Authentication Protocol. Informatica 18(1), 67–78 (2007)
Susilo, W., Mu, Y.: Non-interactive Deniable Ring Authentication. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 386–401. Springer, Heidelberg (2004)
Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)
Lu, R., Cao, Z.: Non-interactive deniable authentication protocol based on factoring. Computer Standards & Interfaces 27(4), 401–405 (2005)
Lu, R., Cao, Z.: A new deniable authentication protocol from bilinear pairings. Applied Mathematics and Computation 168(2), 954–961 (2005)
Qian, H., Cao, Z., Wang, L., Xue, Q.S.: Efficient non-interactive deniable authentication protocols. In: The Fifth International Conference on Computer and Information Technology, CIT 2005, pp. 673–679. IEEE (2005)
Shi, Y., Li, J.: Identity-based deniable authentication protocol. Electronics Letters 41(5), 241–242 (2005)
Brown, D.: Deniable Authentication with RSA and Multicasting, http://eprint.iacr.org/2005/056
Huang, H., Chang, C.: An efficient deniable authentication protocol. In: International Conference on Cyberworlds, pp. 307–310. IEEE (2005)
Fan, C., Zhou, S., Li, F.: An Identity-based Restricted Deniable Authentication Protocol. In: 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, pp. 474–478. IEEE (2009)
Wu, T., Zhang, W., Liu, Z., Mu, C.: An efficient deniable authentication protocol. In: International Conference on Management and Service Science, MASS 2009, pp. 1–4 (2009)
Xin, X., Chen, D.: A Secure and Efficient Deniable Authentication Protocol. In: WASE International Conference on Information Engineering, ICIE 2009, vol. 2, pp. 172–175 (2009)
Xin, X., Chen, D.: ID-based Non-interactive Deniable Authentication Protocol from Pairings. In: International Conference on E-Business and Information System Security, EBISS 2009, pp. 1–4 (2009)
Wei, S.: ID-based non-interactive deniable authentication protocol. In: Fifth International Conference on Information Assurance and Security, IAS 2009, pp. 479–482 (2009)
Di Raimondo, M., Gennaro, R.: New approaches for deniable authentication. Journal of Cryptology 22(4), 572–615 (2009)
Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization. MIT Laboratory for Computer Science Technical Report MIT/LCS/TR-212, MIT, MA (1979)
Li, G., Xin, X., Li, W.: An Enhanced Deniable Authentication Protocol. In: International Conference on Computational Intelligence and Security, CIS 2008, vol. 1, pp. 336–339. IEEE (2008)
Bellare, M., Neven, G.: Multi-Signatures in the Plain Public-Key Model and a General Forking Lemma. In: Proceedings of the 13th Association for Computing Machinery (ACM) Conference on Computer and Communications Security (CCS), pp. 390–399. ACM, Alexandria (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tian, H., Chen, X., Jiang, Z. (2012). Non-interactive Deniable Authentication Protocols. In: Wu, CK., Yung, M., Lin, D. (eds) Information Security and Cryptology. Inscrypt 2011. Lecture Notes in Computer Science, vol 7537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34704-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-34704-7_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34703-0
Online ISBN: 978-3-642-34704-7
eBook Packages: Computer ScienceComputer Science (R0)