Number Theory for Computing
Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract)
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
New directions in cryptography
IEEE Transactions on Information Theory
An overview of public key cryptography
IEEE Communications Magazine - Part Anniversary
Hi-index | 0.00 |
One of the most important features of authentication is the non-repudiation property, implemented by digital signatures. This useful feature of authentication may, however, not be necessary in some cases, such as e-voting, and should indeed be avoided. In this paper, by a combined use of public-key encryption, digital signatures, coding, quadratic residues, and randomness, a new scheme for deniable/repudiable authentication is proposed and analyzed, and a complete example of the scheme is given. The security of the scheme is based on the intractability of the quadratic residuosity problem.