skip to main content
10.1145/3163058.3163070acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

An ID-based Non-Interactive Deniable Authentication Protocol based on ECC

Published: 24 November 2017 Publication History

Abstract

Deniable authentication is an important security aspect for achieving authentication and privacy. The goal is to allow an intended receiver to identify the origin of a given message without being able to prove sender's identity to a third party. In this paper, we propose a pairing-free identity based non-interactive deniable authentication (IB-NIDA) scheme whose security is based on the difficulty of solving elliptic curve computational Diffie-Hellman problem (ECDH). The proposed scheme undergoes a formal security analysis with random oracle model and standard symbolic model (AVISPA). In addition, the performance analysis shows that our proposed scheme achieves efficiency. Furthermore, such design is applicable for resource constrained mobile devices.

References

[1]
Dwork, C., Naor, M. and Sahai, A., 2004. Concurrent zero-knowledge. Journal of the ACM (JACM), 51(6), pp. 851--898.
[2]
Aumann, Y. and Rabin, M.O., 1998, August. Authentication, enhanced security and error correcting codes. In Annual International Cryptology Conference 299--303. Springer, Berlin, Heidelberg.
[3]
Aumann, Y. and Rabin, M., 1998, April. Efficient deniable authentication of long messages. In Int. conf. on theoretical computer science in honor of professor Manuel Blum's 60th birthday 20--24.
[4]
Deng, X., Lee, C.H. and Zhu, H., 2001. Deniable authentication protocols. IEE Proceedings-Computers and Digital Techniques, 148(2), 101--104.
[5]
Fan, L., Xu, C.X. and Li, J.H., 2002. Deniable authentication protocol based on Deffie-Hellman algorithm. Electronics letters, 38(14), 705--706.
[6]
Yoon, E.J., Yoo, K.Y., Yeo, S.S. and Lee, C., 2010. Robust deniable authentication protocol. Wireless personal communications, 55(1), 81--90.
[7]
Liao, I., 2006. IDentity-based deniable authentication protocol from pairings. In Proceedings of the 10 th IASTED International Conference on Internet and Multimedia Systems and Applications.
[8]
Liu, C.Y., Lee, C.C. and Lin, T.C., 2011. Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme. IJ Network Security, 12(1), 58--60.
[9]
Li, C.T., Wei, C.H., Lee, C.C., Chin, Y.H. and Wang, L.J., 2010. A secure and undeniable billing protocol among charged parties for grid computing environments. International Journal of Innovative Computing, Information and Control, 6(11), 5061--5076.
[10]
Shao, Z., 2004. Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Computer Standards & Interfaces, 26(5), 449--454.
[11]
Hsu, C.L., Chuang, Y.H. and Tsai, K.Y., 2008. Novel non-interactive deniable authentication protocol. In The Third Joint Workshop on Information Security. 337--345.
[12]
Shi, Y. and Li, J., 2005. Identity-based deniable authentication protocol. Electronics Letters, 41(5), 241--242.
[13]
Lu, R. and Cao, Z., 2005. Non-interactive deniable authentication protocol based on factoring. Computer Standards & Interfaces, 27(4), 401--405.
[14]
Lee, W.B., Wu, C.C. and Tsaur, W.J., 2007. A novel deniable authentication protocol using generalized ElGamal signature scheme. Information Sciences, 177(6), 1376--1381.
[15]
Cao, T., Lin, D. and Xue, R., 2005, March. An efficient ID-based deniable authentication protocol from pairings. In Advanced Information Networking and Applications, 2005. AINA 2005. 19th International Conference on Vol. 1, 388--391. IEEE.
[16]
Chou, J.S., Chen, Y. and Huang, J.C., 2006. A ID-Based Deniable Authentication Protocol on pairings. IACR Cryptology ePrint Archive, 2006,335.
[17]
Wang, B. and Song, Z., 2009. A non-interactive deniable authentication scheme based on designated verifier proofs. Information Sciences, 179(6), 858--865.
[18]
Li, F., Xiong, P. and Jin, C., 2014. Identity-based deniable authentication for ad hoc networks. Computing, 96(9), 843--853.
[19]
Chen, Y. and Chou, J.S., 2013. ECC-Based Non-Interactive Deniable Authentication with Designated Verifier. IACR Cryptology ePrint Archive, 2013, 783.
[20]
Dolev, D. and Yao, A., 1983. On the security of public key protocols. IEEE Transactions on information theory, 29(2), 198--208.
[21]
Barreto, P.S., Lynn, B. and Scott, M., 2003, August. On the selection of pairing-friendly groups. In International Workshop on Selected Areas in Cryptography 17--25. Springer, Berlin, Heidelberg.
[22]
Chung, Y.F., Huang, K.H., Lai, F. and Chen, T.S., 2007. ID-based digital signature scheme on the elliptic curve cryptosystem. Computer Standards & Interfaces, 29(6), 601--604.
[23]
Fan, A.W. and Lu, S.X., 2010. An improved elliptic curve digital signature algorithm. In Applied Mechanics and Materials Vol. 34, 1024--1027. Trans Tech Publications.

Index Terms

  1. An ID-based Non-Interactive Deniable Authentication Protocol based on ECC

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCNS '17: Proceedings of the 2017 7th International Conference on Communication and Network Security
    November 2017
    125 pages
    ISBN:9781450353496
    DOI:10.1145/3163058
    © 2017 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    In-Cooperation

    • University of Electronic Science and Technology of China: University of Electronic Science and Technology of China

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 November 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. AVISPA
    2. Authentication
    3. Deniability
    4. Non-Interactive
    5. Privacy

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCNS 2017

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 92
      Total Downloads
    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media