STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Dynamic system identification via recurrent multilayer perceptrons
Information Sciences—Informatics and Computer Science: An International Journal
Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract)
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Information Sciences—Informatics and Computer Science: An International Journal - Special issue: Informatics and computer science intelligent systems applications
Multi-view face identification and pose estimation using B-spline interpolation
Information Sciences—Informatics and Computer Science: An International Journal
A non-interactive deniable authentication scheme based on designated verifier proofs
Information Sciences: an International Journal
Information Sciences: an International Journal
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes
Computer Communications
A novel and low-computation e-cash transfer system against blackmail for mobile communications
International Journal of Mobile Communications
Confidential deniable authentication using promised signcryption
Journal of Systems and Software
Non-interactive deniable authentication protocols
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Hi-index | 0.07 |
A deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. Consequently, many interactive and non-interactive deniable authentication protocols have been proposed. However, the interactive manner makes deniable protocols inefficient. In addition, a security hole is generated in deniable protocols that use the non-interactive manner if a session secret is compromised. Thus, there is no secure and efficient deniable authentication protocol as of now. In this paper, a new protocol based on the non-interactive manner is proposed to efficiently and securely achieve deniable authentication. This protocol can furthermore replace the underlying signature scheme in order to retain a secure status even if the previously used signature method is broken.