Analysis Two ID-Based Deniable Authentication Protocols on Pairings
نویسندگان
چکیده
In order to prevent the malicious attack, two new ID-based deniable authentication protocols based on pairings are proposed by Chou et al. and Cao et al., respectively. Both of them proposes some lemmas to prove their scheme can not only attain the desired deniable property but also can prevent malicious attacks. However, the security of these two ID-based deniable authentication protocols are not as strong as they claimed. In this article, we will show that their scheme are also vulnerable to the malicious attacks.
منابع مشابه
A ID-Based Deniable Authentication Protocol on pairings
Tel: 886+(0)5-2721001 ext.2017 Abstract Recently, Yoon et al. and Cao et al. propose two deniable authentication protocols respectively. They both claim that their protocols can achieve the deniable property. However, in this paper, we will point out that their protocols each suffers from some malicious attacks. After that, we propose a new identity-based deniable authentication protocol on pai...
متن کاملAnalysis of Two Types Deniable Authentication Protocols
Deniability enables protocol participants to deny their involvement after they have taken part in a particular protocol run. In this paper, we present the security analysis of a class of interactive deniable authentication protocols and a noninteractive one. For interactive protocols, we focus on a serial of pairings based protocols proposed by Chou et al and repaired by Lim et al. We point out...
متن کاملGroup Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings
Deniable authentication protocol is different from traditional authentication protocol in that the intended receiver can authenticate the source of a given message, but cannot prove the source to a third party. In recent years, many deniable authentication protocols have been put forth. To adapt to some special group communication requirements, in this paper, we will propose a new group oriente...
متن کاملDeniable Authenticated Key Establishment for Internet Protocols
We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof...
متن کاملAn Efficient Deniable Authentication Protocol from Pairings to Protect Users’ Privacy
Deniable authentication is a new cryptographic technique of authentication, by which it allows the sender to prove his legitimacy to the intended receiver, but the intended receiver cannot prove to the third party the identity of the sender. Meanwhile, in order to meet various circumstances of the resource limit mobile devices, Lu and Cao proposed a non-interactive deniable authentication proto...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006