Analysis of Two Types Deniable Authentication Protocols

Deniability enables protocol participants to deny their involvement after they have taken part in a particular protocol run. In this paper, we present the security analysis of a class of interactive deniable authentication protocols and a noninteractive one. For interactive protocols, we focus on a serial of pairings based protocols proposed by Chou et al and repaired by Lim et al. We point out that their repaired protocols are still not secure under Key Compromise Impersonation (KCI) attack and give it an improvement. For noninteractive protocols, we point out that most current noninteractive deniable authentication protocols are not secure under KCI attack.

[1]  Moni Naor,et al.  Non-malleable cryptography , 1991, STOC '91.

[2]  Moni Naor,et al.  Concurrent zero-knowledge , 1998, STOC '98.

[3]  Yonatan Aumann,et al.  Authentication, enhanced security and error correcting codes , 1998 .

[4]  Xiaotie Deng,et al.  Deniable authentication protocols , 2001 .

[5]  Chris Xu,et al.  Deniable authentication protocol based on Deffie-Hellman algorithm , 2002 .

[6]  Xu Chongxiang Deniable Authentication Protocol Based on Diffie-Hellman Algorithm , 2002 .

[7]  Kenneth G. Paterson,et al.  Deniable Authenticated Key Establishment for Internet Protocols , 2003, Security Protocols Workshop.

[8]  Zuhua Shao Efficient deniable authentication protocol based on generalized ElGamal signature scheme , 2004, Comput. Stand. Interfaces.

[9]  Eun-Jun Yoon,et al.  Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm , 2005, Appl. Math. Comput..

[10]  Zhenfu Cao,et al.  Non-interactive deniable authentication protocol based on factoring , 2005, Comput. Stand. Interfaces.

[11]  Zhenfu Cao,et al.  A new deniable authentication protocol from bilinear pairings , 2005, Appl. Math. Comput..

[12]  Dongdai Lin,et al.  An efficient ID-based deniable authentication protocol from pairings , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[13]  Duncan S. Wong,et al.  Cryptanalysis of a suite of deniable authentication protocols , 2006, IEEE Communications Letters.

[14]  Yalin Chen,et al.  A ID-Based Deniable Authentication Protocol on pairings , 2006, IACR Cryptol. ePrint Arch..

[15]  Youngho Park,et al.  An Enhanced ID-Based Deniable Authentication Protocol on Pairings , 2007, ICCSA.

[16]  Zhenfu Cao,et al.  A New ID-Based Deniable Authentication Protocol , 2007, Informatica.

[17]  Wei-Bin Lee,et al.  A novel deniable authentication protocol using generalized ElGamal signature scheme , 2007, Inf. Sci..

[18]  Zhenfu Cao,et al.  Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings , 2007, Int. J. Netw. Secur..

[19]  Sanggon Lee,et al.  Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).