DocumentCode :
3041295
Title :
On the Deniability of Some Deniable Authentication Protocols
Author :
Lim, Meng-Hui ; Lee, Sanggon ; Lee, HoonJae
Author_Institution :
Dept. of Ubiquitous IT, Dongseo Univ., Busan
fYear :
2008
fDate :
Sept. 29 2008-Oct. 4 2008
Firstpage :
257
Lastpage :
262
Abstract :
A deniable authentication protocol enables the protocol participants to authenticate their respective peers, while able to deny their participation after the protocol execution. This protocol can be extremely useful in some practical applications such as online negotiation and electronic voting. In 2007, Ma et al. proposed a chameleon-based deniable authenticated key agreement protocol while in 2006, Lin-Chang proposed another improved deniable authentication protocol. However, we discover that both these schemes are in fact undeniable due to some flaws in their protocol design. In this paper, we prove the opposite of their claims and discuss the undeniability of their schemes in detail.
Keywords :
authorisation; cryptography; protocols; chameleon-based deniable authentication protocols; electronic voting; key agreement protocol; online negotiation; Authentication; Business communication; Communication channels; Electronic voting; Mobile communication; Mobile computing; Privacy; Protocols; Public key; Ubiquitous computing; Authentication Protocol; Chameleon; Deniability; Signature;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mobile Ubiquitous Computing, Systems, Services and Technologies, 2008. UBICOMM '08. The Second International Conference on
Conference_Location :
Valencia
Print_ISBN :
978-0-7695-3367-4
Electronic_ISBN :
978-0-7695-3367-4
Type :
conf
DOI :
10.1109/UBICOMM.2008.13
Filename :
4641345
Link To Document :
بازگشت