Abstract
Deniable authentication is a type of authentication protocol with the special property of deniability. However, there have been several different definitions of deniability in authentication protocols. In this paper, we clarify this issue by defining two types of deniable authentication: In the first type of deniable authentication, the receiver of the authenticated message cannot prove to a third party that the sender has authenticated any message to him. We call this type of deniability full deniability. In the second type of deniable authentication, whilst the receiver can prove to a third party that the sender has authenticated some message to him, but he cannot prove to a third party that the sender has authenticated any particular message to the receiver. We call this type of deniability partial deniability. Note that partial deniability is not implied by full deniability, and that it has applications different from those of full deniability. Consequently, we present two identity-based authentication schemes and prove that one is fully deniable while the other is partially deniable. These two schemes can be useful in different scenarios.
Similar content being viewed by others
References
Dolev D, Dwork C, Naor M. Non-malleable cryptography. SIAM Journal on Computing, 2000, 30(2): 391–437
Dwork C, Naor M, Sahai A. Concurrent Zero-Knowledge, In: Proc. of 30th Symposium on Theory of Computing (STOC), ACM, 1998, 409-418, Full version on http://www.wisdom.weizmann.ac.il/naor/onpub.html
Aumann Y, Rabin M. Authentication, enhanced security and error correcting codes, In: Advances in Cryptology-proc. of Crypto’98, LNCS 1462, Springer-Verlag, 1998, 299–303
Aumann Y, Rabin M. Efficient deniable authentication of long messages. In: Int. International Conference on Theoretical Computer Science in honor of Professor Manuel Blum’s 60th birthday, 1998 (http://www.cs.cityu.edu.hk/dept/video.html)
Wang Y, Li J, Tie L. A simple protocol for deniable authentication based elgamal cryptography. Networks, 2005, 45(4): 193–194
Shi Y, Li J. Identity-based deniable authentication protocol. Electronics Letters, 2005, 41(5): 241–242
Raimondo M D, Gennaro R. New approaches for deniable authentication: the multi-user case. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS’05, ACM, Nov 2005, 112–121
Raimondo M D, Gennaro R, Krawczyk H. Deniable authentication and key exchange. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS’06 SESSION: Applied cryptography II, 2006, 400–409
Lu R, Lin X, Cao Z, Qin L, Liang X. A simple deniable authentication protocol based on the Diffie-Hellman algorithm. International Journal of Computer Mathematics, 2008, 85(9): 1315–1323
Wang B, Song Z X. A non-interactive deniable authentication scheme based on designated verifier proofs. Information Sciences: an International Journal, 2009, 179(6): 858–865
Boneh D, Franklin M. Identity-based encryption from the weil pairing. In: Advances in Cryptology-CRYPTO’2001, Springer-Verlag, 2001, LNCS 2139, 213–229
Goldreich O. Foundations of Cryptography, Vol 1. Cambridge University Press, 2001
Paterson K. Id-Based Signatures from Pairings on Elliptic Curves, Available at http://eprint.iacr.org, 004/2002
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liu, J., Chen, X. & Han, Z. Full and partial deniability for authentication schemes. Front. Comput. Sci. China 4, 516–521 (2010). https://doi.org/10.1007/s11704-010-0365-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11704-010-0365-z