DocumentCode :
1826758
Title :
ID-Based Non-interactive Deniable Authentication Protocol
Author :
Shi, Wei-Min
Author_Institution :
Coll. of Comput. Sci. & Technol., Beijing Univ. of Technol., Beijing, China
Volume :
1
fYear :
2009
fDate :
18-20 Aug. 2009
Firstpage :
479
Lastpage :
482
Abstract :
Noninteractive deniable authentication protocol is vulnerable to the receiver key compromise impersonation attack, which are owing to the reason that the authentication message is computed from the receiver´s private and some other public values. Consequently, in order to be suitable for evaluation the security of noninteractive deniable authentication protocol, we have to redefine the attribute of key-compromise impersonation as the attribute of sender key-compromise impersonation, then proposes an simple and efficient ID based noninteractive deniable authentication protocol. The proposed protocol has no need for use of an additional signature to provide extra authentication, and satisfies authenticity, deniability and sender key-compromise impersonation security attributes simultaneously.
Keywords :
cryptographic protocols; ID based noninteractive deniable authentication protocol; authentication message; authenticity; deniability; receiver key-compromise impersonation attack; security evaluation; Authentication; Computer science; Computer security; Cryptographic protocols; Data security; Educational institutions; Identity management systems; Information security; Public key; Public key cryptography; Deniable authentication protocols; ID-based cryptography; Non-interactive;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security, 2009. IAS '09. Fifth International Conference on
Conference_Location :
Xi´an
Print_ISBN :
978-0-7695-3744-3
Type :
conf
DOI :
10.1109/IAS.2009.46
Filename :
5284274
Link To Document :
بازگشت