ID-Based Non-interactive Deniable Authentication Protocol

  • Authors:
  • Wei-min Shi

  • Affiliations:
  • -

  • Venue:
  • IAS '09 Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 01
  • Year:
  • 2009

Quantified Score

Hi-index 0.01

Visualization

Abstract

Non-interactive deniable authentication protocol is vulnerable to the receiver key-compromise impersonation attack, which are owing to the reason that the authentication message is computed from the receiver’s private and some other public values. Consequently, in order to be suitable for evaluation the security of non-interactive deniable authentication protocol, we have to re-define the attribute of key-compromise impersonation as the attribute of sender key-compromise impersonation, then proposes an simple and efficient ID-based non-interactive deniable authentication protocol. The proposed protocol has no need for use of an additional signature to provide extra authentication, and satisfies authenticity, deniability and sender key-compromise impersonation security attributes simultaneously.