Loading [a11y]/accessibility-menu.js
Cryptanalysis of a suite of deniable authentication protocols | IEEE Journals & Magazine | IEEE Xplore

Cryptanalysis of a suite of deniable authentication protocols


Abstract:

A deniable authentication protocol allows a sender to transfer an authenticated message to a receiver in such a way that the receiver cannot prove to a third party about ...Show More

Abstract:

A deniable authentication protocol allows a sender to transfer an authenticated message to a receiver in such a way that the receiver cannot prove to a third party about the source of the message. In 2001, Deng et al. proposed two deniable authentication protocols under the communication model defined by Aumann and Rabin in 1998. In this paper, we show that these two protocols have a common issue, which incurs vulnerability to the person-in-the-middle (PIM) attack. We also propose a modification for solving the problem.
Published in: IEEE Communications Letters ( Volume: 10, Issue: 6, June 2006)
Page(s): 504 - 506
Date of Publication: 30 June 2006

ISSN Information:


Contact IEEE to Subscribe

References

References is not available for this document.