• DocumentCode
    3697232
  • Title

    ID-Based Deniable Threshold Ring Authentication

  • Author

    Chunhua Jin;Chunxiang Xu;Linzhi Jiang;Fagen Li

  • Author_Institution
    Sch. of Comput. Sci. &
  • fYear
    2015
  • Firstpage
    1779
  • Lastpage
    1784
  • Abstract
    Deniable threshold ring authentication allows at least t members of a group participants to authenticate a message m without revealing which t members have generated the authenticator, and the verifier cannot convince any third party the message m is authenticated. It can be applied in anonymous and privacy communication scenarios. In this paper, we present a non-interactive identity-based deniable threshold ring authentication scheme. Our scheme is provably secure in the random oracle model under the bilinear Diffie-Hellman assumption. To the best of our knowledge, our scheme is the first identity based deniable threshold ring authentication scheme. Our scheme is very efficient since it only requires one pairing operation in authentication phase and one pairing operation in verification phase regardless of the number of the ring.
  • Keywords
    "Authentication","Receivers","Public key","Computer science","Games","Polynomials"
  • Publisher
    ieee
  • Conference_Titel
    High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on
  • Type

    conf

  • DOI
    10.1109/HPCC-CSS-ICESS.2015.149
  • Filename
    7336429