Title :
Deniable message transmission authenticator based on weak signature schemes
Author_Institution :
Sch. of Inf. Sci. & Technol., Sun Yat-sen Univ., Guangzhou, China
Abstract :
This study shows how to use signature schemes for deniable authentication. Deniable authentication means that a message receiver R, although receiving a message m from a sender S, cannot convince a third party that the sender S has sent R the message m. If signature schemes are secure against selective forgery, the authors can construct a full deniable authentication protocol. The protocol is presented in the extension framework of Raimondo et al. as a deniable message transmission authenticator.
Keywords :
authorisation; cryptographic protocols; digital signatures; deniable message transmission authenticator; full deniable authentication protocol; selective forgery; weak signature schemes;
Journal_Title :
Information Security, IET
DOI :
10.1049/iet-ifs.2011.0139