ABSTRACT
In an electronic voting system, authentication is used to ensure that the voter is legitimate without knowing his/her identity, while the vote collectors verify the data is received from a legitimate user without knowing the identity of the voter. One of the authentication schemes that fulfilled this requirement is called a deniable authentication scheme, where the receiver can prove the source of the message while another party cannot identify the source of the message. In 2013, Li-Takagi et al. proposed a deniable authentication scheme. However, Li-Takagi's scheme has weaknesses if the receiver fully cooperates with the third party. In this case, the third party can identify the source of a given message. In the proposed method, zero-knowledge proof is introduced to preserve the anonymity of the deniable authentication scheme when the receiver fully cooperates with the third party. Based on the analysis, the proposed scheme fulfills the requirement of the deniable authentication scheme when the receiver fully cooperates with the third party. However, the proposed scheme has additional computation costs for securing the shared secret key. Two attack schemes that are carried out on both Li-Takagi and the proposed scheme are the MITM attack and the impersonation attack. The probability of breaking the proposed scheme using an MITM attack is lower than when using Li-Takagi's scheme, but the probability of breaking the proposed scheme using an impersonation attack is the same as Li-Takagi's scheme.
- C. Liu, C. Lee, T. Lin, Cryptanalysis of an efficient deniable authentication protocol based on generalized ElGamal signature scheme, in: International Journal of Network Security, 12, (2011), pp. 34-36.Google Scholar
- E. J. Yoon, K.Y. Yoo, S.S. Yeo, C. Lee, Robust deniable authentication protocol. Wireless Personal Communications, 55, (2010) pp. 81–90.Google ScholarDigital Library
- Mahshid* Sadeghpour. Cryptanalysis of an improvement of robust deniable authentication protocol. ICEEC, 85(4):1{6, 2016.Google Scholar
- F. Li, T. Takagi, Cryptanalysis and improvement of robust deniable authentication protocol, Wireless Pres Commun, (2013), pp. 1391-1398.Google Scholar
- C. Dwork, M. Naor, A. Sahai, Concurrent zero-knowledge, in: Proceedings of 30th ACM STOC'98, (1998), pp. 409–418.Google Scholar
- Lim, Meng Hui & Lee, Sanggon & Lee, Hoonjae. (2008). Cryptanalysis on Improved Chou 's ID-Based Deniable Authentication Protocol. Proceedings of the International Conference on Information Science and Security, ICISS 2008. 87-93. 10.1109/ICISS.2008.7.Google ScholarDigital Library
- B. Bhushan, G. Sahoo and A. K. Rai, "Man-in-the-middle attack in wireless and computer networking — A review," 2017 3rd International Conference on Advances in Computing,Communication & Automation (ICACCA) (Fall), 2017, pp. 1-6, doi: 10.1109/ICACCAF.2017.8344724.Google Scholar
- Arshad, Raheel & Ikram, Nassar. (2012). Cryptanalysis of a Non-interactive Deniable Authentication Protocol Based on Factoring. International Journal of Network Security. 14.Google Scholar
- Rama, A. & Rao, G. & Lakshmi, P.V. & Nowpada, Ravi Shankar. (2012). Cryptanalysis of a Deniable Authentication Protocol based on Bilinear Pairing using Single Sender and Group Sender. International Journal of Computer Applications. 41. 10-13. 10.5120/5520-7551.Google Scholar
- W. Diffie, M. Hellman, New directions in cryptography. IEEE Transactions on Information Theory, 22, (1976), pp. 644–654.Google ScholarDigital Library
- Secure Hash Standard (SHS). FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION, FIPS PUB 202, 2015Google Scholar
- T. ElGamal, A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, (1985), pp.469–472.Google ScholarDigital Library
- J. Shao, Z. Cao, R. Lu, An improved deniable authentication protocol. Networks, 48, (2006), pp.179–181.Google ScholarDigital Library
- X. Deng, C.H. Lee, H. Zhu, Deniable authentication protocols, IEE Proceedings – Computers and Digital Techniques 148 (2), (2001), pp. 101–104.Google ScholarCross Ref
Recommendations
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes
Deniable authentication scheme is one of useful tools for secure communications. The scheme allows a sender to prove the authenticity of a message to a specified receiver without permitting the receiver to prove that the message was authenticated by the ...
Confidential deniable authentication using promised signcryption
In a deniable authentication protocol, a receiver is convinced that a received message is indeed from a particular sender, but cannot prove this to any third party. Deniable authentication protocols satisfy deniability and intended receiver properties. ...
A non-interactive deniable authentication scheme based on designated verifier proofs
A deniable authentication protocol enables a receiver to identify the source of the given messages but unable to prove to a third party the identity of the sender. In recent years, several non-interactive deniable authentication schemes have been ...
Comments