首页
社区
课程
招聘
[分享]A novel deniable authentication protocol
发表于: 2009-6-19 19:57 4931

[分享]A novel deniable authentication protocol

2009-6-19 19:57
4931
A novel deniable authentication protocol using generalized ElGamal signature scheme
Wei-Bin Lee , Chia-Chun Wu , Woei-Jiunn Tsaur,*
Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan, ROC
* Department of Information Management, Da-Yeh University, 112, Shan-Jiau Road, Da-Tsuen, Changhua 51505, Taiwan, ROC
Received 15 May 2005; received in revised form 17 April 2006; accepted 26 September 2006

Abstract
A deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. Consequently, many interactive and non-interactive deniable authentication protocols have been proposed. However, the interactive manner makes deniable protocols inefficient. In addition, a security hole is generated in deniable protocols that use the non-interactive manner if a session secret is compromised. Thus, there is no secure and efficient deniable authentication protocol as of now. In this paper, a new protocol based on the non-interactive manner is proposed to efficiently and securely achieve deniable authentication. This protocol can furthermore replace the underlying signature scheme in order to retain a secure status even if the previously used signature method is broken.

Keywords: Information security; Deniable authentication; Digital signature; Internet

[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)

上传的附件:
收藏
免费 0
支持
分享
最新回复 (8)
雪    币: 2096
活跃值: (100)
能力值: (RANK:420 )
在线值:
发帖
回帖
粉丝
2
In this paper, it is insecure.
I know one way to break it for this scheme.
Does any one know how to break/attack it?
2009-6-20 01:05
0
雪    币: 8
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
3
unfortunately, I don't know how 2 break it.
Waiting for others.
2009-6-20 03:46
0
雪    币: 2096
活跃值: (100)
能力值: (RANK:420 )
在线值:
发帖
回帖
粉丝
4
Finally, there is someone reply to me.
So, which one did you know to break it?
2009-6-20 07:39
0
雪    币: 1022
活跃值: (31)
能力值: ( LV4,RANK:50 )
在线值:
发帖
回帖
粉丝
5
很强大,期待rockinuk放出结果
2009-6-20 12:39
0
雪    币: 2096
活跃值: (100)
能力值: (RANK:420 )
在线值:
发帖
回帖
粉丝
6
版上有一些帖的内容,有提到这篇 paper 存在 insecure。
基于这个 insecure,我可以再进行 forgery attack。
等有心的人想发表这篇 paper时,或是等我以后有空写这篇的 Security Analysis 时,我再 release 出来。
2009-6-20 19:09
0
雪    币: 21
活跃值: (26)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
7
可以研读一下。有想法再发表。wait for a moment.
2009-6-20 22:59
0
雪    币: 2096
活跃值: (100)
能力值: (RANK:420 )
在线值:
发帖
回帖
粉丝
8
It has not any reply oever two weeks.
I release a method in attachment.
上传的附件:
2009-7-1 20:07
0
雪    币: 21
活跃值: (26)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
9
今天开始研读,前段时间一直在看别的东西。先简单看了一下,主要是关于数字签名的吧。这样的话,我就考虑从旁路攻击的角度看能不能突破。
2009-7-2 09:28
0
游客
登录 | 注册 方可回帖
返回
//