Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
9506476 | Applied Mathematics and Computation | 2005 | 7 Pages |
Abstract
Recently, an efficient and non-interactive deniable authentication protocol based on the Diffie-Hellman key distribution protocol is presented by Fan et al. to enable a receiver to identify the source of a given message, but not prove the identity of the sender to a third party. In this paper, we point out that it suffers from an authentication flaw similar to that developed by Lowe to Intruder masquerades as other principals and inquisitor INQ can identify the source of the message unlike their claims. Accordingly, we propose an improved protocol to overcome the weaknesses.
Keywords
Related Topics
Physical Sciences and Engineering
Mathematics
Applied Mathematics
Authors
Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo,