Abstract
Deniability is defined as a privacy property which enables protocol principals to deny their involvement after they had taken part in a particular protocol run. Lately, Chou et al. had proposed their ID-based deniable authentication protocol after proving the vulnerability to Key-Compromise Impersonation (KCI) attack in Cao et al.’s protocol. In addition, they claimed that their protocol is not only secure, but also able to achieve both authenticity and deniability properties. However, in this paper, we demonstrate that Chou et al.’s protocol is not flawless as it remains insecure due to its susceptibility to the KCI attack. Based on this, we propose an enhanced scheme which will in fact preserves the authenticity, the deniability and the resistance against the KCI attack.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aumann, Y., Rabin, M.O.: Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract). In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 299–303. Springer, Heidelberg (1998)
Aumann, Y., Rabin, M.O.: Efficient Deniable Authentication of Long Messages. In: Int. Conf. on Theoretical Computer Science in honour of Professor Manuel Blum’s 60th birthday (1998), http://www.cs.cityu.edu.hk/dept/video.html
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Boyd, C., Mao, W., Paterson, K.G.: Deniable Authenticated Key Establishment for Internet Protocols. In: 11th International Workshop on Security Protocols, Cambridge (UK) ( April 2003)
Cao, T.J., Lin, D.D., Xue, R.: An Efficient ID-based Deniable Authentication Protocol from Pairings. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA’05) (2005)
Chou, J.S., Chen, Y.L., Huang, J.C.: A ID-Based Deniable Authentication Protocol on Pairings. Cryptology ePrint Archive: Report (335) (2006)
Chou, J.S., Chen, Y.L., Yang, M.D.: Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols. Cryptology ePrint Archive: Report (451) (2005)
Deng, X., Lee, C., Lee, H., Zhu, H.: Deniable Authentication Protocols. IEE Proc. Comput. Digit. Tech. 148(2), 101–104 (2001)
Dwork, C., Naor, M., Sahai, A.: Concurrent Zero-Knowledge. In: Proc. 30th ACM STOC ’98, Dallas TX, USA, pp. 409–418. ACM Press, New York (1998)
Fan, L., Xu, C.X., Li, J.H.: Deniable Authentication Protocol based on Diffie-Hellman algorithm. Electronics Letters 38(4), 705–706 (2002)
Jiang, S.Q.: Deniable Authentication on the Internet. Cryptology ePrint Archive: Report (082) (2007)
Paterson, K.G.: Cryptography from Pairings: a Snapshot of Current Research. Information Security Technical Report 7(3), 41–54 (2002)
Sakai, R., Ohgishiand, K.: Cryptosystems based on Pairing. In: The 2000 Symposium on Cryptography and Information Security, Okinawa, Japan (2000)
Wilson, S.B., Menezes, A.: Authenticated Diffie-Hellman Key Agreement Protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1999)
Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Improvement of Fan et al.’s Deniable Authentication Protocol based on Diffie-Hellman Algorithm. Applied Mathematics and Computation 167(1), 274–280 (2005)
Zhu, R.W., Wong, D.S., Lee, C.H.: Cryptanalysis of a Suite of Deniable Authentication Protocols. IEEE COMMUNICATIONS LETTERS 10(6), 504–506 (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lim, MH., Lee, S., Park, Y., Lee, H. (2007). An Enhanced ID-Based Deniable Authentication Protocol on Pairings. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_90
Download citation
DOI: https://doi.org/10.1007/978-3-540-74477-1_90
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74475-7
Online ISBN: 978-3-540-74477-1
eBook Packages: Computer ScienceComputer Science (R0)