A non-interactive deniable authentication scheme in the standard model

@article{Wang2011AND,
  title={A non-interactive deniable authentication scheme in the standard model},
  author={Bin Wang and Qing Zhao and Ke Dai},
  journal={IACR Cryptol. ePrint Arch.},
  year={2011},
  volume={2011},
  pages={693}
}
  • Bin Wang, Qing Zhao, Ke Dai
  • Published 2011
  • Computer Science
  • IACR Cryptol. ePrint Arch.
Deniable authentication protocols enable a sender to authenticate a message to a receiver such that the receiver is unable to prove the identity of the sender to a third party. In contrast to interactive schemes, non-interactive deniable authentication schemes improve communication efficiency. Currently, several non-interactive deniable authentication schemes have been proposed with provable security in the random oracle model. In this paper, we study the problem of constructing non-interactive… Expand
6 Citations
A Non-interactive Deniable and Negative Authentication Scheme in Random Oracle Model
Deniable authenticated encryption for e-mail applications
Provably secure certificateless deniable authenticated encryption scheme
  • J. Kar
  • Computer Science
  • J. Inf. Secur. Appl.
  • 2020
A Secure Identity-based Deniable Authentication Protocol for MANETs
On the Relationship Between Weak and Strong Deniable Authenticated Encryption
Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications

References

SHOWING 1-10 OF 33 REFERENCES
A non-interactive deniable authentication scheme based on designated verifier proofs
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Identity-based deniable authentication for ad hoc networks
Security Analysis of a Suite of Deniable Authentication Protocols
Cryptanalysis of a Non-interactive Deniable Authentication Protocol Based on Factoring
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
Security Proofs for Identity-Based Identification and Signature Schemes
A novel deniable authentication protocol using generalized ElGamal signature scheme
...
1
2
3
4
...