Article ID Journal Published Year Pages File Type
9506476 Applied Mathematics and Computation 2005 7 Pages PDF
Abstract
Recently, an efficient and non-interactive deniable authentication protocol based on the Diffie-Hellman key distribution protocol is presented by Fan et al. to enable a receiver to identify the source of a given message, but not prove the identity of the sender to a third party. In this paper, we point out that it suffers from an authentication flaw similar to that developed by Lowe to Intruder masquerades as other principals and inquisitor INQ can identify the source of the message unlike their claims. Accordingly, we propose an improved protocol to overcome the weaknesses.
Related Topics
Physical Sciences and Engineering Mathematics Applied Mathematics
Authors
, , ,