DocumentCode :
3697232
Title :
ID-Based Deniable Threshold Ring Authentication
Author :
Chunhua Jin;Chunxiang Xu;Linzhi Jiang;Fagen Li
Author_Institution :
Sch. of Comput. Sci. &
fYear :
2015
Firstpage :
1779
Lastpage :
1784
Abstract :
Deniable threshold ring authentication allows at least t members of a group participants to authenticate a message m without revealing which t members have generated the authenticator, and the verifier cannot convince any third party the message m is authenticated. It can be applied in anonymous and privacy communication scenarios. In this paper, we present a non-interactive identity-based deniable threshold ring authentication scheme. Our scheme is provably secure in the random oracle model under the bilinear Diffie-Hellman assumption. To the best of our knowledge, our scheme is the first identity based deniable threshold ring authentication scheme. Our scheme is very efficient since it only requires one pairing operation in authentication phase and one pairing operation in verification phase regardless of the number of the ring.
Keywords :
"Authentication","Receivers","Public key","Computer science","Games","Polynomials"
Publisher :
ieee
Conference_Titel :
High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on
Type :
conf
DOI :
10.1109/HPCC-CSS-ICESS.2015.149
Filename :
7336429
Link To Document :
بازگشت