|
|
Full and partial deniability for authentication
schemes |
Jiqiang LIU,Xun CHEN,Zhen HAN, |
Department of Computer
and Information Technology, Beijing Jiaotong University, Beijing 100044,
China; |
|
|
Abstract Deniable authentication is a type of authentication protocol with the special property of deniability. However, there have been several different definitions of deniability in authentication protocols. In this paper, we clarify this issue by defining two types of deniable authentication: In the first type of deniable authentication, the receiver of the authenticated message cannot prove to a third party that the sender has authenticated any message to him. We call this type of deniability full deniability. In the second type of deniable authentication, whilst the receiver can prove to a third party that the sender has authenticated some message to him, but he cannot prove to a third party that the sender has authenticated any particular message to the receiver. We call this type of deniability partial deniability. Note that partial deniability is not implied by full deniability, and that it has applications different from those of full deniability. Consequently, we present two identity-based authentication schemes and prove that one is fully deniable while the other is partially deniable. These two schemes can be useful in different scenarios.
|
Keywords
authentication
deniability
bilinear maps
|
Issue Date: 05 December 2010
|
|
|
Dolev D, Dwork C, Naor M. Non-malleable cryptography. SIAM Journal on Computing, 2000, 30(2): 391―437
doi: 10.1137/S0097539795291562
|
|
1998, 409―418, Full version on www.wisdom.weizmann.ac.il/naor/onpub.html
|
|
Aumann Y, Rabin M. Authentication, enhancedsecurity and error correcting codes, In: Advances in Cryptology-proc. of Crypto'98, LNCS 1462, Springer-Verlag, 1998, 299―303
|
|
)www.cs.cityu.edu.hk/dept/video.html)
|
|
Wang Y, Li J, Tie L. A simple protocol for deniable authenticationbased elgamal cryptography. Networks, 2005, 45(4): 193―194
doi: 10.1002/net.20062
|
|
Shi Y, Li J. Identity-based deniable authentication protocol. Electronics Letters, 2005, 41(5): 241―242
doi: 10.1049/el:20047017
|
|
Raimondo M D, Gennaro R. New approaches for deniable authentication: the multi-user case. In: Proceedings of the 13th ACM Conference on Computerand Communications Security, CCS'05, ACM, Nov 2005, 112―121
|
|
Raimondo M D, Gennaro R, Krawczyk H. Deniable authentication and key exchange.In: Proceedings of the 14th ACM Conference on Computerand Communications Security, CCS'06 SESSION: Applied cryptographyII, 2006, 400―409
|
|
Lu R, Lin X, Cao Z, Qin L, Liang X. A simple deniable authentication protocolbased on the Diffie-Hellman algorithm. International Journal of Computer Mathematics, 2008, 85(9): 1315―1323
doi: 10.1080/00207160701622741
|
|
Wang B, Song Z X. A non-interactive deniableauthentication scheme based on designated verifier proofs. Information Sciences: an International Journal, 2009, 179(6): 858―865
|
|
Boneh D, Franklin M. Identity-based encryption from the weil pairing. In: Advances in Cryptology-CRYPTO'2001, Springer-Verlag, 2001, LNCS 2139, 213―229
|
|
Goldreich O. Foundationsof Cryptography, Vol 1. Cambridge UniversityPress, 2001
doi: 10.1017/CBO9780511546891
|
|
eprint.iacr.org, 004/2002
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|