STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Security Analysis of Hsieh-Sun's Deniable Authentication Protocol
ICHIT '06 Proceedings of the 2006 International Conference on Hybrid Information Technology - Volume 02
Secure Deniable Authentication Protocol Based on ElGamal Cryptography
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
A New ID-Based Deniable Authentication Protocol
Informatica
Non-interactive deniable authentication protocol based on factoring
Computer Standards & Interfaces
Analyzing the Secure Simple Pairing in Bluetooth v4.0
Wireless Personal Communications: An International Journal
Cryptanalysis and Improvement of Robust Deniable Authentication Protocol
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Deniable authentication protocol is a new technique of modern cryptography. The protocol not only enables an intended receiver to identify the source of a received message, but also prevents a third party from identifying the source of the message. Recently, Shao et al. pointed out that Wang et al.'s deniable authentication protocol based on ElGamal cryptosystem is insecure to a person-in-the-middle attack; that is, in the whole process, the receiver cannot be aware of the existence of this adversary as well as the modification of the messages. Furthermore, they also presented a modification of Wang et al.'s protocol to overcome the security flaw. However, this paper demonstrates that Shao et al.'s improved protocol is still susceptible to a malicious receiver's impersonation attack. To mitigate this security breach, we propose a robust deniable authentication protocol based on ElGamal cryptography.