Title :
Cryptanalysis of a suite of deniable authentication protocols
Author :
Zhu, Robert W. ; Wong, Duncan S. ; Lee, Chan H.
Author_Institution :
Dept. of Comput. Sci., City Univ. of Hong Kong
fDate :
6/1/2006 12:00:00 AM
Abstract :
A deniable authentication protocol allows a sender to transfer an authenticated message to a receiver in such a way that the receiver cannot prove to a third party about the source of the message. In 2001, Deng et al. proposed two deniable authentication protocols under the communication model defined by Aumann and Rabin in 1998. In this paper, we show that these two protocols have a common issue, which incurs vulnerability to the person-in-the-middle (PIM) attack. We also propose a modification for solving the problem
Keywords :
message authentication; protocols; public key cryptography; PIM attack; cryptanalysis; deniable authentication protocol; message source; person-in-the-middle; Authentication; Communication channels; Computer science; Councils; Cryptographic protocols; Cryptography; Information security; Resilience;
Journal_Title :
Communications Letters, IEEE
DOI :
10.1109/LCOMM.2006.1638630