STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Hi-index | 0.00 |
In 2002, Fan et al. proposed a deniable authentication protocol based on the Deffie-Hellman key agreement protocol. They guaranteed that the proposed protocol, which is deniable, can authenticate the source of the message and resist the person-in-the-middle(PIM) attack. However, the receiver is not authenticated in the proposed deniable authentication protocol, which will result in some security flaws. As a result, we propose an improvement to overcome these drawbacks in this paper.