Zero-knowledge proofs of identity
Journal of Cryptology
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract)
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Deniable authentication and key exchange
Proceedings of the 13th ACM conference on Computer and communications security
A novel deniable authentication protocol using generalized ElGamal signature scheme
Information Sciences: an International Journal
Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems
Journal of Cryptology
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
On the transferability of private signatures
Information Sciences: an International Journal
Full and partial deniability for authentication schemes
Frontiers of Computer Science in China
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes
Computer Communications
Confidential deniable authentication using promised signcryption
Journal of Systems and Software
Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols
Proceedings of the 2012 ACM conference on Computer and communications security
Non-interactive deniable authentication protocols
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Non-delegatable strong designated verifier signature using a trusted third party without pairings
AISC '13 Proceedings of the Eleventh Australasian Information Security Conference - Volume 138
A novel construction of SDVS with secure disavowability
Cluster Computing
Hi-index | 0.07 |
A deniable authentication protocol enables a receiver to identify the source of the given messages but unable to prove to a third party the identity of the sender. In recent years, several non-interactive deniable authentication schemes have been proposed in order to enhance efficiency. In this paper, we propose a security model for non-interactive deniable authentication schemes. Then a non-interactive deniable authentication scheme is presented based on designated verifier proofs. Furthermore, we prove the security of our scheme under the DDH assumption.