DocumentCode :
3028591
Title :
An Identity-Based Restricted Deniable Authentication Protocol
Author :
Fan, Chengyu ; Zhou, Shijie ; Li, Fegan
Author_Institution :
Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
fYear :
2009
fDate :
10-12 Aug. 2009
Firstpage :
474
Lastpage :
478
Abstract :
A deniable authentication allows the receiver to identify the source of the received messages but cannot prove it to any third party. However, the deniability of the content, which is called restricted deniability in this paper, is concerned in electronic voting and some other similar application. At present, most non-interactive deniable authentication protocols cannot resist weaken key-compromise impersonation (W-KCI) attack. To settle this problem, a non-interactive identity-based restricted deniable authentication protocol is proposed. It not only can resist W-KCI attack but also has the properties of communication flexibility. It meets the security requirements such as correctness, restricted deniability as well. Therefore, this protocol can be applied in electronic voting.
Keywords :
cryptographic protocols; message authentication; identity-based restricted deniable authentication protocol; noninteractive deniable authentication protocol; security requirement; weaken key-compromise impersonation attack; Application software; Authentication; Cryptographic protocols; Distributed processing; Educational institutions; Electronic voting; Identity-based encryption; Public key; Resists; Security; Bilinear pairings; KCI attack; restricted deniability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Parallel and Distributed Processing with Applications, 2009 IEEE International Symposium on
Conference_Location :
Chengdu
Print_ISBN :
978-0-7695-3747-4
Type :
conf
DOI :
10.1109/ISPA.2009.113
Filename :
5207896
Link To Document :
بازگشت