Non-interactive Deniable Authentication Protocols

This paper gives a security model for non-interactive deniable authentication (NIDA) protocols. This model captures a session-state-reveal attack and a key-compromise-impersonation attack. We analyze some NIDA protocols in the model, and we find that no one is satisfactory. We give a new paradigm to construct an NIDA protocol, which is provably secure in the model.

[1]  Wei-Min Shi ID-Based Non-interactive Deniable Authentication Protocol , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[2]  Zhenfu Cao,et al.  Efficient non-interactive deniable authentication protocols , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).

[3]  Tao Wu,et al.  An Efficient Deniable Authentication Protocol , 2009, 2009 International Conference on Management and Service Science.

[4]  Yi Mu,et al.  Non-interactive Deniable Ring Authentication , 2003, ICISC.

[5]  Xin Xiangjun,et al.  A Secure and Efficient Deniable Authentication Protocol , 2009, 2009 WASE International Conference on Information Engineering.

[6]  Xiangjun Xin,et al.  ID-Based Non-Interactive Deniable Authentication Protocol from Pairings , 2009, 2009 International Conference on E-Business and Information System Security.

[7]  Rosario Gennaro,et al.  New Approaches for Deniable Authentication , 2005, CCS '05.

[8]  Zhenfu Cao,et al.  Non-interactive deniable authentication protocol based on factoring , 2005, Comput. Stand. Interfaces.

[9]  Yalin Chen,et al.  A ID-Based Deniable Authentication Protocol on pairings , 2006, IACR Cryptol. ePrint Arch..

[10]  Li Wei,et al.  An Enhanced Deniable Authentication Protocol , 2008 .

[11]  Jongin Lim,et al.  Information Security and Cryptology - ICISC 2003 , 2003, Lecture Notes in Computer Science.

[12]  Moni Naor,et al.  Concurrent zero-knowledge , 2004, JACM.

[13]  Jianhua Li,et al.  Identity-based deniable authentication protocol , 2005 .

[14]  Daniel R. L. Brown Deniable Authentication with RSA and Multicasting , 2005, IACR Cryptol. ePrint Arch..

[15]  Mihir Bellare,et al.  Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.

[16]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[17]  Zhenfu Cao,et al.  A New ID-Based Deniable Authentication Protocol , 2007, Informatica.

[18]  Fagen Li,et al.  An Identity-Based Restricted Deniable Authentication Protocol , 2009, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications.

[19]  Chin-Chen Chang,et al.  An efficient deniable authentication protocol , 2005, 2005 International Conference on Cyberworlds (CW'05).

[20]  Zhenfu Cao,et al.  A new deniable authentication protocol from bilinear pairings , 2005, Appl. Math. Comput..

[21]  Wei-Bin Lee,et al.  A novel deniable authentication protocol using generalized ElGamal signature scheme , 2007, Inf. Sci..

[22]  Nikita Borisov,et al.  Off-the-record communication, or, why not to use PGP , 2004, WPES '04.

[23]  Bo Meng,et al.  A Secure Non-Interactive Deniable Authentication Protocol with Strong Deniability Based on Discrete Logarithm Problem and its Application on Internet Voting Protocol , 2009 .

[24]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .

[25]  Bin Wang,et al.  A non-interactive deniable authentication scheme based on designated verifier proofs , 2009, Inf. Sci..

[26]  Zuhua Shao Efficient deniable authentication protocol based on generalized ElGamal signature scheme , 2004, Comput. Stand. Interfaces.

[27]  Colin Boyd,et al.  Advances in Cryptology - ASIACRYPT 2001 , 2001 .