Abstract
Since the information technology continues to grow and the network applications are getting popular, protecting the privacy of Internet users on the open network becomes a necessary concern. The traditional authentication protocol is not suitable for the requirements of internet security nowadays. That is, it cannot assure that the private information not be revealed during the authentication operation, or be used by malicious terminal service managers for their personal gain in some other business opportunities. Hence, in the dissertation, we propose a deniable authentication protocol based on elliptic curve cryptography (ECC) to satisfy the current public key infrastructure and fulfill the following security requirements of deniable authentication protocols.
1. Each user can prove his/her legitimacy to the designated verifier.
2. The designated verifier cannot prove the identity of the user to the third party even though the verifier provides the testimonials.
Moreover, the proposed deniable authentication protocol is suitable for the mobile devices since it only needs limited computation resources.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Moore, G.E.: Cramming More Components onto Integrated Circuits. Electronics 38(8), 114–117 (1965)
Kohl, J., Neuman, C.: The Kerberos Authentication Service. Internet RFC 1510 (1993)
Huang, H., Cao, Z.: An ID-Based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem. In: ASIACCS 2009:Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (2009)
Jun, E.A., Ji, J.D., Lim, J., Jung, S.W.: Improved Remote User Authentication Scheme Using Bilinear Pairings. In: ICHIT 2009: Proceedings of the 2009 International Conference on Hybrid Information Technology (2009)
Shieh, W.G., Horng, W.B.: Security Analysis and Improvement of Remote User Authentication Scheme without Using Smart Cards. ICIC Express Letters: An International Journal of Research and Surveys 4(6), 2431–2436 (2010)
Shieh, W.G., Horng, W.B.: Cryptanalysis and Improvement of Wen et al.’s Provably Secure Authentication Key Exchange Protocols for Low Power Computing Devices. ICIC Express Letters: An International Journal of Research and Surveys 5(11), 4027–4032 (2011)
Yoon, E.J., Lee, W.S., Yoo, K.Y.: Secure Remote User Authentication Scheme Using Bilinear Pairings. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 102–114. Springer, Heidelberg (2007)
Dwork, C., Naor, M., Sahai, A.: Concurrent Zero-Knowledge. In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 409–418 (1998)
Aumann, Y., Rabin, M.: Efficient Deniable Authentication of Long Message. In: Int. Conf. on Theoretical Computer Science in Honor of Professor Manuel Blum’s 60th Birthday (1998), http://www.cs.cityu.edu.hk/dept/video.html (retrieved from)
Deng, X., Lee, C.H., Zhu, H.: Deniable Authentication Protocols. IEE Proceeding of Computer and Digital Techniques 148(2), 101–104 (2001)
Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)
Fan, L., Xu, C.X., Li, J.H.: Deniable Authentication Protocol Based on Diffie-Hellman Algorithm. Electronics Letters 38(4), 705–706 (2002)
Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Improvement of Fan et al.’s Deniable Authentication Protocol Based on Diffie-Hellman Algorithm. Applied Mathematics and Computation 167(1), 274–280 (2005)
Wang, Y., Li, J., Tie, L.: A Simple Protocol for Deniable Authentication Based on ElGamal Cryptography. 2005 Wiley Periodicals, Inc. NETWORKS 45(4), 193–194 (2005)
Kar, J., Majhi, B.: A Novel Deniable Authentication Protocol Based on Diffie-Hellman Algorithm Using Pairing Technique. In: ICCCS 2011:Proceedings of the 2011 International Conference on Communication, Computing & Security (2011)
Lu, R., Cao, Z.: A New Deniable Authentication Protocol from Bilinear Pairings. Applied Mathematics and Computation 168(2), 954–961 (2005)
Lu, R., Lin, X., Cao, Z., Qin, L., Liang, X.: A Simple Deniable Authentication Protocol Based on the Diffie-Hellman Algorithm. International Journal of Computer Mathematics 22(3), 1–9 (2007)
Shao, Z.: Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme. Computer Standards & Interfaces 26(5), 449–454 (2004)
Shi, Y., Li, J.: Identity-Based Deniable Authentication Protocol. Electronics Letters 41(5) (2005)
Raimondo, M.D., Gennaro, R., Krawczyk, H.: Deniable Authentication and Key Exchange. In: CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security (2006)
Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation 48(177), 203–209 (1987)
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signature and Public Key Cryptosystem. Communications of the ACM 21(2), 120–126 (1978)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Chuang, YH., Hsu, CL., Shu, W., Hsu, K.C., Liao, MW. (2015). A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography. In: Barbucha, D., Nguyen, N., Batubara, J. (eds) New Trends in Intelligent Information and Database Systems. Studies in Computational Intelligence, vol 598. Springer, Cham. https://doi.org/10.1007/978-3-319-16211-9_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-16211-9_19
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-16210-2
Online ISBN: 978-3-319-16211-9
eBook Packages: EngineeringEngineering (R0)