Universal Encrypted Deniable Authentication Protocol

The notion of deniable authentication protocol was introduced in 1998 by Dwork et al. [11] and Aumann and Rabin [1, 2] independently. As a new cryptographic authentication protocol, a deniable authentication protocol enables an intended receiver to identify the source of a given message without being able to prove the identity of the sender to a third party. Over the past years, many deniable authentication protocols have been proposed. In this paper, we would like to present a universal encrypted deniable authentication protocol from any public key encryption scheme. Provided that the public key encryption scheme is secure, a secure deniable authentication protocol can be directly derived.

[1]  Zhenfu Cao,et al.  Efficient non-interactive deniable authentication protocols , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).

[2]  Yonatan Aumann,et al.  Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract) , 1998, CRYPTO.

[3]  Zuhua Shao Efficient deniable authentication protocol based on generalized ElGamal signature scheme , 2004, Comput. Stand. Interfaces.

[4]  Daniel R. Simon,et al.  Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.

[5]  Chris Xu,et al.  Deniable authentication protocol based on Deffie-Hellman algorithm , 2002 .

[6]  Zhenfu Cao,et al.  A new deniable authentication protocol from bilinear pairings , 2005, Appl. Math. Comput..

[7]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[8]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[9]  Tatsuaki Okamoto,et al.  Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.

[10]  David Pointcheval,et al.  REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform , 2001, CT-RSA.

[11]  Zhenfu Cao,et al.  An improved deniable authentication protocol , 2006, Networks.

[12]  Mihir Bellare,et al.  Optimal Asymmetric Encryption-How to Encrypt with RSA , 1995 .

[13]  Dongdai Lin,et al.  An efficient ID-based deniable authentication protocol from pairings , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[14]  Duncan S. Wong,et al.  Cryptanalysis of a suite of deniable authentication protocols , 2006, IEEE Communications Letters.

[15]  Moni Naor,et al.  Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.

[16]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[17]  Xiaolei Dong,et al.  Group Oriented Deniable Authentication Protocol , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).

[18]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[19]  Xu Chongxiang Deniable Authentication Protocol Based on Diffie-Hellman Algorithm , 2002 .

[20]  Jianhua Li,et al.  Identity-based deniable authentication protocol , 2005 .

[21]  Zhenfu Cao,et al.  A New ID-Based Deniable Authentication Protocol , 2007, Informatica.

[22]  Zhenfu Cao,et al.  Non-interactive deniable authentication protocol based on factoring , 2005, Comput. Stand. Interfaces.

[23]  Jianhua Li,et al.  A simple protocol for deniable authentication based on ElGamal cryptography , 2005, Networks.

[24]  Mihir Bellare,et al.  Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..

[25]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[26]  Xiaotie Deng,et al.  Deniable authentication protocols , 2001 .

[27]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[28]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[29]  Ronald Cramer,et al.  A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.

[30]  A. Shamm Identity-based cryptosystems and signature schemes , 1985 .

[31]  Ed Dawson,et al.  A Public Key Cryptosystem Based on the Subgroup Membership Problem , 2001, ICICS.

[32]  Ed Dawson,et al.  A Public Key Cryptosystem Based On A Subgroup Membership Problem , 2005, Des. Codes Cryptogr..