Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2010, Vol. 4 Issue (4) : 516-521    https://doi.org/10.1007/s11704-010-0365-z
Research articles
Full and partial deniability for authentication schemes
Jiqiang LIU,Xun CHEN,Zhen HAN,
Department of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China;
 Download: PDF(111 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract Deniable authentication is a type of authentication protocol with the special property of deniability. However, there have been several different definitions of deniability in authentication protocols. In this paper, we clarify this issue by defining two types of deniable authentication: In the first type of deniable authentication, the receiver of the authenticated message cannot prove to a third party that the sender has authenticated any message to him. We call this type of deniability full deniability. In the second type of deniable authentication, whilst the receiver can prove to a third party that the sender has authenticated some message to him, but he cannot prove to a third party that the sender has authenticated any particular message to the receiver. We call this type of deniability partial deniability. Note that partial deniability is not implied by full deniability, and that it has applications different from those of full deniability. Consequently, we present two identity-based authentication schemes and prove that one is fully deniable while the other is partially deniable. These two schemes can be useful in different scenarios.
Keywords authentication      deniability      bilinear maps      
Issue Date: 05 December 2010
 Cite this article:   
Jiqiang LIU,Xun CHEN,Zhen HAN. Full and partial deniability for authentication schemes[J]. Front. Comput. Sci., 2010, 4(4): 516-521.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-010-0365-z
https://academic.hep.com.cn/fcs/EN/Y2010/V4/I4/516
Dolev D, Dwork C, Naor M. Non-malleable cryptography. SIAM Journal on Computing, 2000, 30(2): 391―437

doi: 10.1137/S0097539795291562
1998, 409―418, Full version on www.wisdom.weizmann.ac.il/naor/onpub.html
Aumann Y, Rabin M. Authentication, enhancedsecurity and error correcting codes, In: Advances in Cryptology-proc. of Crypto'98, LNCS 1462, Springer-Verlag, 1998, 299―303
)www.cs.cityu.edu.hk/dept/video.html)
Wang Y, Li J, Tie L. A simple protocol for deniable authenticationbased elgamal cryptography. Networks, 2005, 45(4): 193―194

doi: 10.1002/net.20062
Shi Y, Li J. Identity-based deniable authentication protocol. Electronics Letters, 2005, 41(5): 241―242

doi: 10.1049/el:20047017
Raimondo M D, Gennaro R. New approaches for deniable authentication: the multi-user case. In: Proceedings of the 13th ACM Conference on Computerand Communications Security, CCS'05, ACM, Nov 2005, 112―121
Raimondo M D, Gennaro R, Krawczyk H. Deniable authentication and key exchange.In: Proceedings of the 14th ACM Conference on Computerand Communications Security, CCS'06 SESSION: Applied cryptographyII, 2006, 400―409
Lu R, Lin X, Cao Z, Qin L, Liang X. A simple deniable authentication protocolbased on the Diffie-Hellman algorithm. International Journal of Computer Mathematics, 2008, 85(9): 1315―1323

doi: 10.1080/00207160701622741
Wang B, Song Z X. A non-interactive deniableauthentication scheme based on designated verifier proofs. Information Sciences: an International Journal, 2009, 179(6): 858―865
Boneh D, Franklin M. Identity-based encryption from the weil pairing. In: Advances in Cryptology-CRYPTO'2001, Springer-Verlag, 2001, LNCS 2139, 213―229
Goldreich O. Foundationsof Cryptography, Vol 1. Cambridge UniversityPress, 2001

doi: 10.1017/CBO9780511546891
eprint.iacr.org, 004/2002
[1] Nilesh CHAKRABORTY, Samrat MONDAL. On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries[J]. Front. Comput. Sci., 2021, 15(2): 152803-.
[2] Lip Yee POR, Chin Soon KU, Amanul ISLAM, Tan Fong ANG. Graphical password: prevent shoulder-surfing attack using digraph substitution rules[J]. Front. Comput. Sci., 2017, 11(6): 1098-1108.
[3] Peng JIANG,Qiaoyan WEN,Wenmin LI,Zhengping JIN,Hua ZHANG. An anonymous and efficient remote biometrics user authentication scheme in a multi server environment[J]. Front. Comput. Sci., 2015, 9(1): 142-156.
[4] Xixiang LV,Hui LI. Error- and loss-tolerant bundle fragment authentication for space DTNs[J]. Front. Comput. Sci., 2014, 8(6): 1012-1023.
[5] Boyang WANG, Hui LI, Jin CAO. An efficient MAC scheme for secure network coding with probabilistic detection[J]. Front Comput Sci, 2012, 6(4): 429-441.
[6] Anh Tuan LUU, Jun SUN, Yang LIU, Jin Song DONG, Xiaohong LI, Thanh Tho QUAN. SeVe: automatic tool for verification of security protocols[J]. Front Comput Sci, 2012, 6(1): 57-75.
[7] WANG Lingling, ZHANG Guoyin, MA Chunguang. ID-based deniable ring authentication with constant-size signature[J]. Front. Comput. Sci., 2008, 2(1): 106-112.
[8] LUO Weiqi, QU Zhenhua, PAN Feng, HUANG Jiwu. A survey of passive technology for digital image forensics[J]. Front. Comput. Sci., 2007, 1(2): 166-179.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed