Analysis Two ID-Based Deniable Authentication Protocols on Pairings

نویسندگان

  • Wen-Chung Kuo
  • Yu-Chih Huang
  • Yung-Cheng Lee
چکیده

In order to prevent the malicious attack, two new ID-based deniable authentication protocols based on pairings are proposed by Chou et al. and Cao et al., respectively. Both of them proposes some lemmas to prove their scheme can not only attain the desired deniable property but also can prevent malicious attacks. However, the security of these two ID-based deniable authentication protocols are not as strong as they claimed. In this article, we will show that their scheme are also vulnerable to the malicious attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A ID-Based Deniable Authentication Protocol on pairings

Tel: 886+(0)5-2721001 ext.2017 Abstract Recently, Yoon et al. and Cao et al. propose two deniable authentication protocols respectively. They both claim that their protocols can achieve the deniable property. However, in this paper, we will point out that their protocols each suffers from some malicious attacks. After that, we propose a new identity-based deniable authentication protocol on pai...

متن کامل

Analysis of Two Types Deniable Authentication Protocols

Deniability enables protocol participants to deny their involvement after they have taken part in a particular protocol run. In this paper, we present the security analysis of a class of interactive deniable authentication protocols and a noninteractive one. For interactive protocols, we focus on a serial of pairings based protocols proposed by Chou et al and repaired by Lim et al. We point out...

متن کامل

Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings

Deniable authentication protocol is different from traditional authentication protocol in that the intended receiver can authenticate the source of a given message, but cannot prove the source to a third party. In recent years, many deniable authentication protocols have been put forth. To adapt to some special group communication requirements, in this paper, we will propose a new group oriente...

متن کامل

Deniable Authenticated Key Establishment for Internet Protocols

We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof...

متن کامل

An Efficient Deniable Authentication Protocol from Pairings to Protect Users’ Privacy

Deniable authentication is a new cryptographic technique of authentication, by which it allows the sender to prove his legitimacy to the intended receiver, but the intended receiver cannot prove to the third party the identity of the sender. Meanwhile, in order to meet various circumstances of the resource limit mobile devices, Lu and Cao proposed a non-interactive deniable authentication proto...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006