A novel certificateless deniable authentication protocol

Deniable authenticate is a different and attractive authenticate mechanism compared with the traditional authentication. It allows the appointed receiver to identify the identity of the sender, but not to prove the source of a given message to a third party even if the appointed receiver is willing to reveal its private key. Certificateless public key cryptography can solve both the public key certificate management problem of public key infrastructure-based cryptography and the key escrow problem of identity-based cryptography. In this paper, we first define a security model for certificateless deniable authentication protocols. Then we propose a non-interactive certificateless deniable authentication protocol. In addition, we prove its security in the random oracle model. Our protocol can be applied in many actual application scenarios, such as electronic voting, electronic tendering, and online shopping.

[1]  Chris Xu,et al.  Deniable authentication protocol based on Deffie-Hellman algorithm , 2002 .

[2]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[3]  Yalin Chen,et al.  A ID-Based Deniable Authentication Protocol on pairings , 2006, IACR Cryptol. ePrint Arch..

[4]  Moni Naor,et al.  Concurrent zero-knowledge , 1998, STOC '98.

[5]  Duncan S. Wong,et al.  Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.

[6]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[7]  Yonatan Aumann,et al.  Authentication, enhanced security and error correcting codes , 1998 .

[8]  Youngho Park,et al.  An Enhanced ID-Based Deniable Authentication Protocol on Pairings , 2007, ICCSA.

[9]  Jacques Stern,et al.  Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.

[10]  Chunhua Jin,et al.  Identity-based deniable authentication for ad hoc networks , 2013, Computing.

[11]  Xiaotie Deng,et al.  Deniable authentication protocols , 2001 .

[12]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[13]  Eun-Jun Yoon,et al.  Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm , 2005, Appl. Math. Comput..

[14]  Xu Chongxiang Deniable Authentication Protocol Based on Diffie-Hellman Algorithm , 2002 .

[15]  Jianhua Li,et al.  Identity-based deniable authentication protocol , 2005 .

[16]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[17]  Maede Ashouri-Talouki,et al.  Anonymous Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks , 2014, MUE 2014.

[18]  Shin-Jia Hwang,et al.  Deniable Authentication Protocols with Confidentiality and Anonymous Fair Protections , 2013 .

[19]  Dongdai Lin,et al.  An efficient ID-based deniable authentication protocol from pairings , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[20]  A. Shamm Identity-based cryptosystems and signature schemes , 1985 .

[21]  Xiaohui Liang,et al.  A simple deniable authentication protocol based on the Diffie–Hellman algorithm , 2008, Int. J. Comput. Math..

[22]  Sanggon Lee,et al.  Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).

[23]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[24]  Bin Wang,et al.  A non-interactive deniable authentication scheme based on designated verifier proofs , 2009, Inf. Sci..

[25]  Zuhua Shao Efficient deniable authentication protocol based on generalized ElGamal signature scheme , 2004, Comput. Stand. Interfaces.

[26]  Yi Liu,et al.  Security Analysis of a Suite of Deniable Authentication Protocols , 2013, Int. J. Netw. Secur..

[27]  Zhenfu Cao,et al.  A New ID-Based Deniable Authentication Protocol , 2007, Informatica.

[28]  Yalin Chen,et al.  ECC-Based Non-Interactive Deniable Authentication with Designated Verifier , 2013, IACR Cryptol. ePrint Arch..

[29]  Haibo Tian,et al.  Non-interactive Deniable Authentication Protocols , 2011, Inscrypt.