A Non-interactive Deniable Authentication Scheme in the Standard Model

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A non-interactive deniable authentication scheme in the standard model

the standard model Bin Wang ,Qing Zhao and Ke Dai Information Engineering College of Yangzhou University No.196 West HuaYang Road, Yangzhou City, Jiangsu Province, P.R.China E-mail: [email protected] Abstract: Deniable authentication protocols enable a sender to authenticate a message to a receiver such that the receiver is unable to prove the identity of the sender to a third party. In contrast...

متن کامل

Non-interactive Deniable Ring Authentication

In this paper, we propose a new primitive called non interactive deniable ring authentication: it is possible to convince a verifier that a member of an ad hoc collection of participants is authenticating a message m without revealing which one and the verifier V cannot convince any third party that the message m was indeed authenticated in a non-interactive way. Unlike the deniable ring authen...

متن کامل

Non-interactive Deniable Authentication Protocol Using Generalized ECDSA Signature Scheme

Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. This paper describes a secure non-interactive deniable authentication protocol using ECDSA signature scheme. The security of the protocol is based on diff...

متن کامل

A non-interactive deniable authentication scheme based on designated verifier proofs

A non-interactive deniable authentication scheme based on designated verifier proofs Bin Wang Information Engineering College of Yangzhou University No.36 Middle JiangYang Road, Yangzhou City, Jiangsu Province, P.R.China Tel: 086-0514-82220820 E-mail:[email protected] Abstract: A deniable authentication protocol enables a receiver to identify the source of the given messages but unable to prov...

متن کامل

ECC-Based Non-Interactive Deniable Authentication with Designated Verifier

Recently, researchers have proposed many non-interactive deniable authentication (NIDA) protocols. Most of them claim that their protocols possess full deniability. However, after reviewing, we found that they either cannot achieve full deniability, or suffer KCI or SKCI attack; moreover, lack efficiency, because they are mainly based on DLP, factoring problem, or bilinear pairings. Due to this...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Electrical and Electronic Engineering

سال: 2017

ISSN: 2329-1613

DOI: 10.11648/j.jeee.20170502.19