Skip to main content

A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography

  • Conference paper
New Trends in Intelligent Information and Database Systems

Part of the book series: Studies in Computational Intelligence ((SCI,volume 598))

Abstract

Since the information technology continues to grow and the network applications are getting popular, protecting the privacy of Internet users on the open network becomes a necessary concern. The traditional authentication protocol is not suitable for the requirements of internet security nowadays. That is, it cannot assure that the private information not be revealed during the authentication operation, or be used by malicious terminal service managers for their personal gain in some other business opportunities. Hence, in the dissertation, we propose a deniable authentication protocol based on elliptic curve cryptography (ECC) to satisfy the current public key infrastructure and fulfill the following security requirements of deniable authentication protocols.

1. Each user can prove his/her legitimacy to the designated verifier.

2. The designated verifier cannot prove the identity of the user to the third party even though the verifier provides the testimonials.

Moreover, the proposed deniable authentication protocol is suitable for the mobile devices since it only needs limited computation resources.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Moore, G.E.: Cramming More Components onto Integrated Circuits. Electronics 38(8), 114–117 (1965)

    Google Scholar 

  2. Kohl, J., Neuman, C.: The Kerberos Authentication Service. Internet RFC 1510 (1993)

    Google Scholar 

  3. Huang, H., Cao, Z.: An ID-Based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem. In: ASIACCS 2009:Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (2009)

    Google Scholar 

  4. Jun, E.A., Ji, J.D., Lim, J., Jung, S.W.: Improved Remote User Authentication Scheme Using Bilinear Pairings. In: ICHIT 2009: Proceedings of the 2009 International Conference on Hybrid Information Technology (2009)

    Google Scholar 

  5. Shieh, W.G., Horng, W.B.: Security Analysis and Improvement of Remote User Authentication Scheme without Using Smart Cards. ICIC Express Letters: An International Journal of Research and Surveys 4(6), 2431–2436 (2010)

    Google Scholar 

  6. Shieh, W.G., Horng, W.B.: Cryptanalysis and Improvement of Wen et al.’s Provably Secure Authentication Key Exchange Protocols for Low Power Computing Devices. ICIC Express Letters: An International Journal of Research and Surveys 5(11), 4027–4032 (2011)

    Google Scholar 

  7. Yoon, E.J., Lee, W.S., Yoo, K.Y.: Secure Remote User Authentication Scheme Using Bilinear Pairings. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 102–114. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Dwork, C., Naor, M., Sahai, A.: Concurrent Zero-Knowledge. In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 409–418 (1998)

    Google Scholar 

  9. Aumann, Y., Rabin, M.: Efficient Deniable Authentication of Long Message. In: Int. Conf. on Theoretical Computer Science in Honor of Professor Manuel Blum’s 60th Birthday (1998), http://www.cs.cityu.edu.hk/dept/video.html (retrieved from)

  10. Deng, X., Lee, C.H., Zhu, H.: Deniable Authentication Protocols. IEE Proceeding of Computer and Digital Techniques 148(2), 101–104 (2001)

    Article  Google Scholar 

  11. Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)

    Google Scholar 

  12. Fan, L., Xu, C.X., Li, J.H.: Deniable Authentication Protocol Based on Diffie-Hellman Algorithm. Electronics Letters 38(4), 705–706 (2002)

    Article  Google Scholar 

  13. Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Improvement of Fan et al.’s Deniable Authentication Protocol Based on Diffie-Hellman Algorithm. Applied Mathematics and Computation 167(1), 274–280 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  14. Wang, Y., Li, J., Tie, L.: A Simple Protocol for Deniable Authentication Based on ElGamal Cryptography. 2005 Wiley Periodicals, Inc. NETWORKS 45(4), 193–194 (2005)

    MATH  MathSciNet  Google Scholar 

  15. Kar, J., Majhi, B.: A Novel Deniable Authentication Protocol Based on Diffie-Hellman Algorithm Using Pairing Technique. In: ICCCS 2011:Proceedings of the 2011 International Conference on Communication, Computing & Security (2011)

    Google Scholar 

  16. Lu, R., Cao, Z.: A New Deniable Authentication Protocol from Bilinear Pairings. Applied Mathematics and Computation 168(2), 954–961 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  17. Lu, R., Lin, X., Cao, Z., Qin, L., Liang, X.: A Simple Deniable Authentication Protocol Based on the Diffie-Hellman Algorithm. International Journal of Computer Mathematics 22(3), 1–9 (2007)

    Google Scholar 

  18. Shao, Z.: Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme. Computer Standards & Interfaces 26(5), 449–454 (2004)

    Article  Google Scholar 

  19. Shi, Y., Li, J.: Identity-Based Deniable Authentication Protocol. Electronics Letters 41(5) (2005)

    Google Scholar 

  20. Raimondo, M.D., Gennaro, R., Krawczyk, H.: Deniable Authentication and Key Exchange. In: CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security (2006)

    Google Scholar 

  21. Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation 48(177), 203–209 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  22. Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signature and Public Key Cryptosystem. Communications of the ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Hao Chuang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Chuang, YH., Hsu, CL., Shu, W., Hsu, K.C., Liao, MW. (2015). A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography. In: Barbucha, D., Nguyen, N., Batubara, J. (eds) New Trends in Intelligent Information and Database Systems. Studies in Computational Intelligence, vol 598. Springer, Cham. https://doi.org/10.1007/978-3-319-16211-9_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16211-9_19

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16210-2

  • Online ISBN: 978-3-319-16211-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics