91
Views
7
CrossRef citations to date
0
Altmetric
Original Articles

A simple deniable authentication protocol based on the Diffie–Hellman algorithm

, , , &
Pages 1315-1323 | Received 03 Jan 2006, Accepted 06 Aug 2007, Published online: 20 Aug 2008

References

  • Abdalla , M. , Bellare , M. and Rogaway , P. 2001 . The oracle Diffie-Hellman assumptions and an analysis of DHIES . Topics in Cryptology - CT-RSA 2001 , 2020 : 143 – 158 . LNCS
  • Aumann , Y. and Rabin , M. 1998 . Authentication, enhanced security and error correcting codes . Advances in Cryptology-Crypto'98 , 1462 : 299 – 303 . LNCS
  • Bellar , M. and Rogaway , P. 1993 . Random oracles are practical: a paradigm for designing efficient protocols . Proceedings of the 1st CSS , : 62 – 73 .
  • Boneh , D. and Franklin , M. 2003 . Identity-based encryption from the Weil pairing . SIAM. J. Comput , 32 : 586 – 615 .
  • Boneh , D. , Lynn , B. and Shacham , H. 2001 . Short signatures from the Weil pairing . Advances in Cryptology - Asiacrypt’01 , 2248 : 514 – 532 . LNCS
  • Deng , X. , Lee , C. H. and Zhu , H. 2001 . Deniable authentication protocols . IEE Proc. Comput. Digi. Tech , 148 : 101 – 104 .
  • Diffie , W. and Hellman , M. E. 1976 . New directions in cryptography . IEEE Trans. Info. Theory , 22 : 644 – 654 .
  • Dwork , C. , Naor , M. and Sahai , A. 1998 . Concurrent zero-knowledge . Proceedings of 30th ACM STOC’98 , : 409 – 418 .
  • Fan , L. , Xu , C. X. and Li , J. H. 2002 . Deniable authentication protocol based on Diffie-Hellman algorithm . Electron. Lett , 38 : 705 – 706 .
  • Lu , R. and Cao , Z. 2005 . Non-interactive deniable authentication protocol based on factoring . Comp. Stand. Interfaces , 27 : 401 – 405 .
  • Lu , R. and Cao , Z. 2005 . A new deniable authentication protocol from bilinear pairings . Appl. Math. Comput , 168 : 954 – 961 .
  • Lu , R. and Cao , Z. 2007 . Erratum to ‘Non-interactive deniable authentication protocol based on factoring’ . Comput. Stand. Interfaces , 29 : 275
  • Lu , R. , Cao , Z. , Wang , S. and Bao , H. 2007 . A new id-based deniable authentication protocol . Informatica , 18 : 67 – 78 .
  • Shao , Z. 2004 . Efficient deniable authentication protocol based on generalized ElGamal signature scheme . Comp. Stand. Interfaces , 26 : 449 – 454 .
  • Shi , Y. and Li , J. 2005 . Identity-based deniable authentication protocol . Electron. Lett , 41 : 241 – 242 .
  • Shoup , V. 2004 . Sequences of games: a tool for taming complexity in security proofs . Cryptology ePrint Archive: Report 2004/332 , Available at: http://eprint.iacr.org/2004/332

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.