An Enhanced ID-based Deniable Authentication Protocol on Pairings

@article{Lim2007AnEI,
  title={An Enhanced ID-based Deniable Authentication Protocol on Pairings},
  author={Meng-Hui Lim and Sanggon Lee and Young Ho Park and Hoonjae Lee},
  journal={IACR Cryptology ePrint Archive},
  year={2007},
  volume={2007},
  pages={113}
}
Deniability is defined as a privacy property which enables protocol principals to deny their involvement after they had taken part in a particular protocol run. Lately, Chou et al. had proposed their ID-based deniable authentication protocol after proving the vulnerability to Key-Compromise Impersonation (KCI) attack in Cao et al.'s protocol. In addition, they claimed that their protocol is not only secure, but also able to achieve both authenticity and deniability properties. However, in this… CONTINUE READING
BETA

Similar Papers

Figures and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 13 CITATIONS

A novel certificateless deniable authentication protocol

  • IACR Cryptology ePrint Archive
  • 2013
VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Chaos Function Based - Secure Deniable Authentication Protocol

VIEW 11 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

An Enhanced Deniable Authentication Protocol

  • 2008 International Conference on Computational Intelligence and Security
  • 2008
VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Secure Key Exchange over Internet Miss .

Pooja P. Taral, Vijay B. Gadicha
  • 2014
VIEW 1 EXCERPT
CITES BACKGROUND

A Secure and Efficient Deniable Authentication Protocol

  • 2009 WASE International Conference on Information Engineering
  • 2009
VIEW 1 EXCERPT
CITES BACKGROUND

An Identity-Based Restricted Deniable Authentication Protocol

  • 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications
  • 2009
VIEW 2 EXCERPTS
CITES BACKGROUND

Analysis of Two Types Deniable Authentication Protocols

  • I. J. Network Security
  • 2009
VIEW 2 EXCERPTS
CITES BACKGROUND

ID-Based Non-Interactive Deniable Authentication Protocol from Pairings

  • 2009 International Conference on E-Business and Information System Security
  • 2009
VIEW 3 EXCERPTS
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 15 REFERENCES

Deniable Authentication of Long Messages

Yonatan Aumann, Michael O. Rabin, “Efficient
  • Int. Conf. on Theoretical Computer Science in honour of Professor Manuel Blum’s 60th birthday,
  • 1998
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Deniable Authenticated Key Establishment for Internet Protocols

  • Security Protocols Workshop
  • 2003
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL