Abstract
E-mail brings us lots of conveniences. Especially with help of PGP and S/MIME, it gives both confidentiality and message/origin authentication. However, in some cases for strong privacy, a message sender will not want to let others know even the fact that he sent a message to a recipient. Very recently, Harn and Ren proposed a fully deniable authentication scheme for E-mail where a sender can repudiate his or her signature. In this paper, however, their deniable authentication scheme is proved not to be fully deniable. To resolve this deniability problem, we suggest a designated verifier signature scheme to support strong privacy, and construct a privacy-enhanced deniable authentication E-mail scheme using the designated verifier signature scheme. Compared with the Harn and Ren’s scheme, the proposed scheme has a simple cryptographic structure and can be easily realized with the existing secure E-mail systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
S/MIME: Secure Multipuepose Internet Mail Extensions, http://www.rsasecurity.com/standards/smime/
OpenPGP: An Open Specification for Pretty Good Privacy, http://www.ietf.org/html.charters/openpgp-charter.html
Harn, L., Ren, J.: Design of Fully Deniable Authentication Service for E-mail Applications. IEEE Communications Letters 12(3), 219–221 (2008)
Jakobsson, M., Sako, K., Impagliazzo, R.: Designated Verifier Proofs and Their Applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)
Saeednia, S., Kramer, S., Markovitch, O.: An Efficient Strong Designated Verifier Signature Scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 40–54. Springer, Heidelberg (2004)
Dolev, D., Dwork, C., Naor, M.: Non-malleable Cryptography. SIAM Journal on Computing 30(2), 391–437 (2000)
Rackoff, C., Simon, D.: Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433–444. Springer, Heidelberg (1992)
Fujisaki, E., Okamoto, T., Pointcheval, D., Stern, J.: RSA-OAEP is secure under the RSA assumption. J. of Cryptology 17(2), 81–104 (2004)
Sun, H., Hsieh, B., Hwang, H.: Secure E-mail Protocols Providing Perfect Forward Secrecy. IEEE Communications Letters 9(1), 58–60 (2005)
Dent, A.W.: Flaws in an E-mail Protocol of Sun, Hsieh, and Hwang. IEEE Communications Letters 9(8), 7180–7719 (2005)
Kim, B.H., Koo, J.H., Lee, D.H.: Robust E-mail Protocols with Perfect Forward Secrecy. IEEE Communications Letters 10(6), 510–512 (2006)
Yoon, E.J., Yoo, K.Y.: Cryptanalysis of Robust E-mail Protocols with Perfect Forward Secrecy. IEEE Communications Letters 11(56), 372–374 (2007)
Aumann, Y., Rabin, M.O.: Authentication, enhanced security and error correcting codes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 299–303. Springer, Heidelberg (1998)
Jakobsson, M., Sako, K., Impagliazzo, R.: Designated Verifier Proofs and their Applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)
Huang, X., Susilo, W., Mu, Y., Zhang, F.: Short (Identity-Based) Strong Designated Verifier Signature Schemes. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds.) ISPEC 2006. LNCS, vol. 3903, pp. 214–225. Springer, Heidelberg (2006)
Laguillaumie, F., Vergnaud, D.: Designated Verifiers Signature: Anonymity and Efficient Construction from any Bilinear Map. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 105–119. Springer, Heidelberg (2005)
Laguillaumie, F., Vergnaud, D.: Multi-designated Verifiers Signatures. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 495–507. Springer, Heidelberg (2004)
Zhang, J., Mao, J.: A Novel ID-Based Designated Verifier Signature Scheme. Information Sciences 178, 733–766 (2008)
Rivest, R., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)
Saeednia, S., Kramer, S., Markovitch, O.: An Efficient Strong Designated Verifier Signature Scheme. In: Yazıcı, A., Şener, C. (eds.) ISCIS 2003. LNCS, vol. 2869, pp. 40–54. Springer, Heidelberg (2003)
Susilo, W., Zhang, F., Mu, Y.: Identity-based Strong Designated Verifier Signature Schemes. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 313–324. Springer, Heidelberg (2004)
Cramer, R., Shoup, V.: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack. SIAM Journal on Computing 33(1), 167–226 (2003)
Bender, A., Katz, J., Morselli, R.: Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 60–79. Springer, Heidelberg (2006)
Lee, J., Chang, J.K., Lee, D.H.: Forgery attacks on Kang et al.’s Identity-Based Strong Designated Verifier Signature Scheme and its improvement with security proof. Computers and Electrical Engineering 35, 49–53 (2009)
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ki, J., Yeong Hwang, J., Nyang, D., Hoon Lee, D., Lim, J. (2011). Privacy-Enhanced Deniable Authentication E-Mail Service. In: Ariwa, E., El-Qawasmeh, E. (eds) Digital Enterprise and Information Systems. DEIS 2011. Communications in Computer and Information Science, vol 194. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22603-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-22603-8_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22602-1
Online ISBN: 978-3-642-22603-8
eBook Packages: Computer ScienceComputer Science (R0)