On the Deniability of Some Deniable Authentication Protocols

A deniable authentication protocol enables the protocol participants to authenticate their respective peers, while able to deny their participation after the protocol execution. This protocol can be extremely useful in some practical applications such as online negotiation and electronic voting. In 2007, Ma et al. proposed a chameleon-based deniable authenticated key agreement protocol while in 2006, Lin-Chang proposed another improved deniable authentication protocol. However, we discover that both these schemes are in fact undeniable due to some flaws in their protocol design. In this paper, we prove the opposite of their claims and discuss the undeniability of their schemes in detail.

[1]  Alfred Menezes,et al.  Authenticated Diffie-Hellman Key Agreement Protocols , 1998, Selected Areas in Cryptography.

[2]  Yalin Chen,et al.  Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols , 2005, IACR Cryptol. ePrint Arch..

[3]  Jianhua Li,et al.  Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery , 2007, HCI.

[4]  Reihaneh Safavi-Naini,et al.  ID-Based Chameleon Hashes from Bilinear Pairings , 2003, IACR Cryptol. ePrint Arch..

[5]  Eun-Jun Yoon,et al.  Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm , 2005, Appl. Math. Comput..

[6]  Rosario Gennaro,et al.  New approaches for deniable authentication , 2005, CCS.

[7]  Giuseppe Ateniese,et al.  Identity-Based Chameleon Hash and Applications , 2004, Financial Cryptography.

[8]  Moni Naor,et al.  Concurrent zero-knowledge , 2004, JACM.

[9]  Hugo Krawczyk,et al.  Deniable authentication and key exchange , 2006, CCS '06.

[10]  Youngho Park,et al.  An Enhanced ID-Based Deniable Authentication Protocol on Pairings , 2007, ICCSA.

[11]  Ying Wang,et al.  Chameleon Signature from Bilinear Pairing , 2003, IACR Cryptol. ePrint Arch..

[12]  Kwangjo Kim,et al.  Chameleon Hashing Without Key Exposure , 2004, ISC.

[13]  Sanggon Lee,et al.  Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).

[14]  Hugo Krawczyk,et al.  Chameleon Signatures , 2000, NDSS.

[15]  Yalin Chen,et al.  A ID-Based Deniable Authentication Protocol on pairings , 2006, IACR Cryptol. ePrint Arch..

[16]  Chris Xu,et al.  Deniable authentication protocol based on Deffie-Hellman algorithm , 2002 .

[17]  Jianhua Li,et al.  Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).

[18]  Yunlei Zhao,et al.  Deniable Internet Key Exchange , 2010, ACNS.

[19]  Kenneth G. Paterson,et al.  Deniable Authenticated Key Establishment for Internet Protocols , 2003, Security Protocols Workshop.

[20]  Xiaotie Deng,et al.  Deniable authentication protocols , 2001 .

[22]  Xu Chongxiang Deniable Authentication Protocol Based on Diffie-Hellman Algorithm , 2002 .

[23]  Chia-Chen Lin,et al.  An Improved Deniable Authentication Protocol , 2006 .