References
- Dwork C, Naor M, Sahai A. Concurrent zero-knowledge. In: Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing Symposium on Theory of Computing (STOC’98); Dallas,TX, USA; 1998. p. 409–418.
- Aumann Y, Rabin M. Authentication, enhanced security and error correcting codes. In: Advances in cryptology, 1998. California, USA; 1998. p. 299–303.
- Aumann Y, Rabin M. Efficient deniable authentication of long messages; 1999. Available from: http://www.cs.cityu.edu.hk/dept/video.html.
- Deng X, Lee CH, Zhu H. Deniable authentication protocols. J. IEE Proc. -Comput. Digital Tech. 2001;148:101–104.
- Fan L, Xu C, Li J. Deniable authentication protocol based on Diffie–Hellman algorithm. J. Electron. Lett. 2002;38:705–706.
- Yoon EJ, Ryu EK, Yoo KY. Improvement of Fan et al.’s deniable authentication protocol based on Diffie–Hellman algorithm. J. Appl. Math. Comput. 2005;167:274–280.
- Lu R, Cao Z, Wang S, et al. A new ID-based deniable authentication protocol. Informatica. 2007;18:67–78.
- Lu R, Lin X, Cao Z, et al. A simple deniable authentication protocol based on the Diffie–Hellman algorithm. Int. J. Comput. Math. 2008;85:1315–1323.
- Tian H, Chen X, Wei B, et al. Security analysis of a suite of deniable authentication protocols. Int. J. Network Secur. 2013;15:369–374.
- Shao Z. Efficient deniable authentication protocol based on generalized Elgamal signature scheme. J. Comput. Stand. Interfaces. 2004;26:447–454.
- Wang B, Song Z. A non-interactive deniable authentication scheme based on designated verifier proofs. J. Inform. Sci. 2009;179:858–865.
- Tian H, Chen X, Jiang Z. Non-interactive deniable authentication protocols. In: Proceedings of Information Security and Cryptology-Inscrypt 2011; Beijing, China; 2011. p. 142–159.
- Hwang S, Sung Y, Chi J. Deniable authentication protocols with confidentiality and anonymous fair protections [C]. Proceedings of 13th International Conference on Intellient Systems Design and Applications, ISDA 2013, Salangor, Malaysia, 2013, 41–51.
- Ashouri-Talouki M, Baraani-Dastjerdi A. Anonymous electronic voting protocol with deniable authentication for mobile ad hoc networks [J]. Int. J. Multimedia Ubiquitous Eng. 2014;9:361–368.
- Shamir A. Identity-based cryptosystems and signature schemes. In: Advances in Cryptology, Proceedings of CRYPTO ’84, Santa Barbara, August 19–22, 1984. California, USA; 1985. p. 47–53.
- Chou JS, Chen Y, Huang JC. A ID-based deniable authentication protocol on pairings. Cryptology ePrint Archive, Report (335); 2006.
- Lim MH, Lee S, Park Y. An enhanced ID-based deniable authentication protocol on pairings. In: Proceedings Springer International Computational Science and Its Applications (ICCSA’07). Kuala Lumpur, Malaysia; 2007. p. 1008–1017.
- Lim MH, Lee S. Cryptanalysis on improved Chou et al.’s ID-based deniable authentication protocol. In: Proceedings Springer International Information Systems Security (ICISS’08); Hyderabad, India; 2008. p. 87–93.
- Shi Y, Li J. Identity-based deniable authentication protocol. J. IEE Electron. Lett. 2005;41:241–242.
- Cao T, Lin D, Xue R. An Efficient ID-based Deniable Authentication Protocol from Pairings. In: Proceedings of IEEE Computer Society, Advanced Information Networking and Applications (AINA’05); Taipei, Taiwan; 2005. p. 388–391.
- Li F, Xiong P, Jin C. Identity-based deniable authentication for ad hoc networks. Computing. 2014;96:843–853.
- Chen Y, Chou J. ECC-based non-interactive deniable authentication with designated verifier. IACR Cryptology ePrint Archive, 783, 2013. 2013.
- Al-Riyami S, Paterson K. Certificateless public key cryptography. In: Advances in Cryptology-Asiacrypt, 2003. Taipei, Taiwan; 2003. p. 452–473.
- ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory. 1985;31:469–472.
- Boneh D, Franklin M. Identity-based encryption from the weil pairing. SIAM J. Comput. 2003;32:586–615.
- Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. J. Cryptography. 2000;13:361–396.
- Cha JC, Cheon JH. An identity-based signature from gap Diffie-Hellman groups. In: Proceedings Public Key Cryptography (PKC’03). Miami, USA: Springer; 2003.p. 18–30.