59
Views
0
CrossRef citations to date
0
Altmetric
Articles

A novel certificateless deniable authentication protocol

, , &
Pages 181-192 | Received 20 Oct 2015, Accepted 08 May 2016, Published online: 06 Jun 2016

References

  • Dwork C, Naor M, Sahai A. Concurrent zero-knowledge. In: Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing Symposium on Theory of Computing (STOC’98); Dallas,TX, USA; 1998. p. 409–418.
  • Aumann Y, Rabin M. Authentication, enhanced security and error correcting codes. In: Advances in cryptology, 1998. California, USA; 1998. p. 299–303.
  • Aumann Y, Rabin M. Efficient deniable authentication of long messages; 1999. Available from: http://www.cs.cityu.edu.hk/dept/video.html.
  • Deng X, Lee CH, Zhu H. Deniable authentication protocols. J. IEE Proc. -Comput. Digital Tech. 2001;148:101–104.
  • Fan L, Xu C, Li J. Deniable authentication protocol based on Diffie–Hellman algorithm. J. Electron. Lett. 2002;38:705–706.
  • Yoon EJ, Ryu EK, Yoo KY. Improvement of Fan et al.’s deniable authentication protocol based on Diffie–Hellman algorithm. J. Appl. Math. Comput. 2005;167:274–280.
  • Lu R, Cao Z, Wang S, et al. A new ID-based deniable authentication protocol. Informatica. 2007;18:67–78.
  • Lu R, Lin X, Cao Z, et al. A simple deniable authentication protocol based on the Diffie–Hellman algorithm. Int. J. Comput. Math. 2008;85:1315–1323.
  • Tian H, Chen X, Wei B, et al. Security analysis of a suite of deniable authentication protocols. Int. J. Network Secur. 2013;15:369–374.
  • Shao Z. Efficient deniable authentication protocol based on generalized Elgamal signature scheme. J. Comput. Stand. Interfaces. 2004;26:447–454.
  • Wang B, Song Z. A non-interactive deniable authentication scheme based on designated verifier proofs. J. Inform. Sci. 2009;179:858–865.
  • Tian H, Chen X, Jiang Z. Non-interactive deniable authentication protocols. In: Proceedings of Information Security and Cryptology-Inscrypt 2011; Beijing, China; 2011. p. 142–159.
  • Hwang S, Sung Y, Chi J. Deniable authentication protocols with confidentiality and anonymous fair protections [C]. Proceedings of 13th International Conference on Intellient Systems Design and Applications, ISDA 2013, Salangor, Malaysia, 2013, 41–51.
  • Ashouri-Talouki M, Baraani-Dastjerdi A. Anonymous electronic voting protocol with deniable authentication for mobile ad hoc networks [J]. Int. J. Multimedia Ubiquitous Eng. 2014;9:361–368.
  • Shamir A. Identity-based cryptosystems and signature schemes. In: Advances in Cryptology, Proceedings of CRYPTO ’84, Santa Barbara, August 19–22, 1984. California, USA; 1985. p. 47–53.
  • Chou JS, Chen Y, Huang JC. A ID-based deniable authentication protocol on pairings. Cryptology ePrint Archive, Report (335); 2006.
  • Lim MH, Lee S, Park Y. An enhanced ID-based deniable authentication protocol on pairings. In: Proceedings Springer International Computational Science and Its Applications (ICCSA’07). Kuala Lumpur, Malaysia; 2007. p. 1008–1017.
  • Lim MH, Lee S. Cryptanalysis on improved Chou et al.’s ID-based deniable authentication protocol. In: Proceedings Springer International Information Systems Security (ICISS’08); Hyderabad, India; 2008. p. 87–93.
  • Shi Y, Li J. Identity-based deniable authentication protocol. J. IEE Electron. Lett. 2005;41:241–242.
  • Cao T, Lin D, Xue R. An Efficient ID-based Deniable Authentication Protocol from Pairings. In: Proceedings of IEEE Computer Society, Advanced Information Networking and Applications (AINA’05); Taipei, Taiwan; 2005. p. 388–391.
  • Li F, Xiong P, Jin C. Identity-based deniable authentication for ad hoc networks. Computing. 2014;96:843–853.
  • Chen Y, Chou J. ECC-based non-interactive deniable authentication with designated verifier. IACR Cryptology ePrint Archive, 783, 2013. 2013.
  • Al-Riyami S, Paterson K. Certificateless public key cryptography. In: Advances in Cryptology-Asiacrypt, 2003. Taipei, Taiwan; 2003. p. 452–473.
  • ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory. 1985;31:469–472.
  • Boneh D, Franklin M. Identity-based encryption from the weil pairing. SIAM J. Comput. 2003;32:586–615.
  • Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. J. Cryptography. 2000;13:361–396.
  • Cha JC, Cheon JH. An identity-based signature from gap Diffie-Hellman groups. In: Proceedings Public Key Cryptography (PKC’03). Miami, USA: Springer; 2003.p. 18–30.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.