Skip to main content

An Enhanced ID-Based Deniable Authentication Protocol on Pairings

  • Conference paper
Computational Science and Its Applications – ICCSA 2007 (ICCSA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4706))

Included in the following conference series:

Abstract

Deniability is defined as a privacy property which enables protocol principals to deny their involvement after they had taken part in a particular protocol run. Lately, Chou et al. had proposed their ID-based deniable authentication protocol after proving the vulnerability to Key-Compromise Impersonation (KCI) attack in Cao et al.’s protocol. In addition, they claimed that their protocol is not only secure, but also able to achieve both authenticity and deniability properties. However, in this paper, we demonstrate that Chou et al.’s protocol is not flawless as it remains insecure due to its susceptibility to the KCI attack. Based on this, we propose an enhanced scheme which will in fact preserves the authenticity, the deniability and the resistance against the KCI attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aumann, Y., Rabin, M.O.: Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract). In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 299–303. Springer, Heidelberg (1998)

    Google Scholar 

  2. Aumann, Y., Rabin, M.O.: Efficient Deniable Authentication of Long Messages. In: Int. Conf. on Theoretical Computer Science in honour of Professor Manuel Blum’s 60th birthday (1998), http://www.cs.cityu.edu.hk/dept/video.html

  3. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Google Scholar 

  4. Boyd, C., Mao, W., Paterson, K.G.: Deniable Authenticated Key Establishment for Internet Protocols. In: 11th International Workshop on Security Protocols, Cambridge (UK) ( April 2003)

    Google Scholar 

  5. Cao, T.J., Lin, D.D., Xue, R.: An Efficient ID-based Deniable Authentication Protocol from Pairings. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA’05) (2005)

    Google Scholar 

  6. Chou, J.S., Chen, Y.L., Huang, J.C.: A ID-Based Deniable Authentication Protocol on Pairings. Cryptology ePrint Archive: Report (335) (2006)

    Google Scholar 

  7. Chou, J.S., Chen, Y.L., Yang, M.D.: Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols. Cryptology ePrint Archive: Report (451) (2005)

    Google Scholar 

  8. Deng, X., Lee, C., Lee, H., Zhu, H.: Deniable Authentication Protocols. IEE Proc. Comput. Digit. Tech. 148(2), 101–104 (2001)

    Article  Google Scholar 

  9. Dwork, C., Naor, M., Sahai, A.: Concurrent Zero-Knowledge. In: Proc. 30th ACM STOC ’98, Dallas TX, USA, pp. 409–418. ACM Press, New York (1998)

    Google Scholar 

  10. Fan, L., Xu, C.X., Li, J.H.: Deniable Authentication Protocol based on Diffie-Hellman algorithm. Electronics Letters 38(4), 705–706 (2002)

    Article  Google Scholar 

  11. Jiang, S.Q.: Deniable Authentication on the Internet. Cryptology ePrint Archive: Report (082) (2007)

    Google Scholar 

  12. Paterson, K.G.: Cryptography from Pairings: a Snapshot of Current Research. Information Security Technical Report 7(3), 41–54 (2002)

    Article  Google Scholar 

  13. Sakai, R., Ohgishiand, K.: Cryptosystems based on Pairing. In: The 2000 Symposium on Cryptography and Information Security, Okinawa, Japan (2000)

    Google Scholar 

  14. Wilson, S.B., Menezes, A.: Authenticated Diffie-Hellman Key Agreement Protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  15. Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Improvement of Fan et al.’s Deniable Authentication Protocol based on Diffie-Hellman Algorithm. Applied Mathematics and Computation 167(1), 274–280 (2005)

    Article  MATH  Google Scholar 

  16. Zhu, R.W., Wong, D.S., Lee, C.H.: Cryptanalysis of a Suite of Deniable Authentication Protocols. IEEE COMMUNICATIONS LETTERS 10(6), 504–506 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Osvaldo Gervasi Marina L. Gavrilova

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lim, MH., Lee, S., Park, Y., Lee, H. (2007). An Enhanced ID-Based Deniable Authentication Protocol on Pairings. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_90

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74477-1_90

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74475-7

  • Online ISBN: 978-3-540-74477-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics