DocumentCode :
961437
Title :
Cryptanalysis of a suite of deniable authentication protocols
Author :
Zhu, Robert W. ; Wong, Duncan S. ; Lee, Chan H.
Author_Institution :
Dept. of Comput. Sci., City Univ. of Hong Kong
Volume :
10
Issue :
6
fYear :
2006
fDate :
6/1/2006 12:00:00 AM
Firstpage :
504
Lastpage :
506
Abstract :
A deniable authentication protocol allows a sender to transfer an authenticated message to a receiver in such a way that the receiver cannot prove to a third party about the source of the message. In 2001, Deng et al. proposed two deniable authentication protocols under the communication model defined by Aumann and Rabin in 1998. In this paper, we show that these two protocols have a common issue, which incurs vulnerability to the person-in-the-middle (PIM) attack. We also propose a modification for solving the problem
Keywords :
message authentication; protocols; public key cryptography; PIM attack; cryptanalysis; deniable authentication protocol; message source; person-in-the-middle; Authentication; Communication channels; Computer science; Councils; Cryptographic protocols; Cryptography; Information security; Resilience;
fLanguage :
English
Journal_Title :
Communications Letters, IEEE
Publisher :
ieee
ISSN :
1089-7798
Type :
jour
DOI :
10.1109/LCOMM.2006.1638630
Filename :
1638630
Link To Document :
بازگشت