DocumentCode
3697232
Title
ID-Based Deniable Threshold Ring Authentication
Author
Chunhua Jin;Chunxiang Xu;Linzhi Jiang;Fagen Li
Author_Institution
Sch. of Comput. Sci. &
fYear
2015
Firstpage
1779
Lastpage
1784
Abstract
Deniable threshold ring authentication allows at least t members of a group participants to authenticate a message m without revealing which t members have generated the authenticator, and the verifier cannot convince any third party the message m is authenticated. It can be applied in anonymous and privacy communication scenarios. In this paper, we present a non-interactive identity-based deniable threshold ring authentication scheme. Our scheme is provably secure in the random oracle model under the bilinear Diffie-Hellman assumption. To the best of our knowledge, our scheme is the first identity based deniable threshold ring authentication scheme. Our scheme is very efficient since it only requires one pairing operation in authentication phase and one pairing operation in verification phase regardless of the number of the ring.
Keywords
"Authentication","Receivers","Public key","Computer science","Games","Polynomials"
Publisher
ieee
Conference_Titel
High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on
Type
conf
DOI
10.1109/HPCC-CSS-ICESS.2015.149
Filename
7336429
Link To Document