Article ID Journal Published Year Pages File Type
461258 Journal of Systems and Software 2011 8 Pages PDF
Abstract

In a deniable authentication protocol, a receiver is convinced that a received message is indeed from a particular sender, but cannot prove this to any third party. Deniable authentication protocols satisfy deniability and intended receiver properties. Among the proposed deniable authentication protocols, non-interactive protocols are more efficient than interactive protocols by reducing communication cost. The Hwang and Ma, and the Hwang and Chao non-interactive protocols provide sender anonymity. Recently some interactive protocols provide confidentiality while no non-interactive protocols do. However, the transferred data may damage sender or receiver anonymity. To provide confidentiality and anonymity efficiently, the first promised signcryption scheme is proposed. Using our promised signcryption scheme, we propose the first efficient non-interactive deniable authentication protocol with confidentiality, sender anonymity, and sender protection.

► Message confidentiality is important for the deniable authentication scheme with anonymity protection for sender/receiver. ► The first promised signcryption scheme is proposed. ► By using our promised signcryption scheme, the first efficient non-interactive deniable authentication protocol with confidentiality and anonymous signer protections is proposed.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, ,