An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection

In the field of social survey of misconduct and legal consultation, the features of confidentiality, integrity, deniable authentication, and non-repudiation are needed for the sake of preserving privacy. For this special kind of application scenario, we propose an efficient deniable authentication encryption scheme. Our scheme can achieve the four secure features in a single logical step. And compared with the latest scheme, our scheme reduces the computational cost of encryption by about 30%, reduces computational cost of decryption by about 50%, and reduces the length of ciphertext by about 33%. Its security is shown in the random oracle model.

[1]  Zhenfu Cao,et al.  An improved deniable authentication protocol , 2006, Networks.

[2]  Wei-Bin Lee,et al.  A novel deniable authentication protocol using generalized ElGamal signature scheme , 2007, Inf. Sci..

[3]  Chris Xu,et al.  Deniable authentication protocol based on Deffie-Hellman algorithm , 2002 .

[4]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[5]  Chunhua Jin,et al.  Identity-based deniable authentication for ad hoc networks , 2013, Computing.

[6]  Fagen Li,et al.  Cryptanalysis and Improvement of Robust Deniable Authentication Protocol , 2012, Wireless Personal Communications.

[7]  Ronald Cramer,et al.  Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..

[8]  Dimitriadis Evangelos,et al.  The Quest to Replace Passwords : a Framework for Comparative Evaluation of Web Authentication Schemes , 2016 .

[9]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[10]  Jianhua Li,et al.  A simple protocol for deniable authentication based on ElGamal cryptography , 2005, Networks.

[11]  Lein Harn,et al.  Design of generalised ElGamal type digital signature schemes based on discrete logarithm , 1994 .

[12]  Frank Stajano Pico: No More Passwords! , 2011, Security Protocols Workshop.

[13]  Zhenfu Cao,et al.  Non-interactive deniable authentication protocol based on factoring , 2005, Comput. Stand. Interfaces.

[14]  Chris J. Mitchell,et al.  Impostor: a single sign-on system for use from untrusted devices , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[15]  Fagen Li,et al.  Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement , 2018, Comput. Stand. Interfaces.

[16]  Craig Metz,et al.  A One-Time Password System , 1996, RFC.

[17]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[18]  Arun Ross,et al.  From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[19]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..

[20]  Yonatan Aumann,et al.  Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract) , 1998, CRYPTO.

[21]  Syed Abdul Haq,et al.  PERSUASIVE CUED CLICK-POINTS : DESIGN , IMPLEMENTATION , AND EVALUATION OF A KNOWLEDGE-BASED AUTHENTICATION MECHANISM , 2014 .

[22]  Daphna Weinshall,et al.  Cognitive authentication schemes safe against spyware , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[23]  Moni Naor,et al.  Concurrent zero-knowledge , 2004, JACM.

[24]  Eun-Jun Yoon,et al.  Robust Deniable Authentication Protocol , 2010, Wirel. Pers. Commun..

[25]  Xiaotie Deng,et al.  Deniable authentication protocols , 2001 .

[26]  Fagen Li,et al.  Efficient Deniably Authenticated Encryption and Its Application to E-Mail , 2016, IEEE Transactions on Information Forensics and Security.

[27]  Kent E. Seamons,et al.  Simple Authentication for the Web , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[28]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[29]  Bin Wang,et al.  A non-interactive deniable authentication scheme based on designated verifier proofs , 2009, Inf. Sci..

[30]  Zuhua Shao Efficient deniable authentication protocol based on generalized ElGamal signature scheme , 2004, Comput. Stand. Interfaces.