http://iet.metastore.ingenta.com
1887

Deniable authentication protocols

Deniable authentication protocols

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IEE Proceedings - Computers and Digital Techniques — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Two deniable authentication schemes have been developed. One is based on the intractability of the factoring problem, and the other is based on the intractability of the discrete logarithm problem. The computation cost of the first scheme is about (t+2)/2s. The second scheme requires about (2t+3)/4s of a previous scheme; s is the length of a message block and t is the cost of multiplication mod N operations. It is shown that both protocols reserve all cryptographic characterisations of the previous scheme.

References

    1. 1)
      • Y. AUMANN , M. RABIN . Authentication, enhanced security and error correcting codes. Crypto ’98 , 299 - 303
    2. 2)
      • AUMANN, Y., RABIN, M.: `Efficient deniable authentication of long messages', Int. Conf. on Theoretical Computer Science in honor of Professor Manuel Blum's 60th birthday, 1998, http:/ /www.cs.cityu. edu.hk/dept/video.html.
    3. 3)
      • C. DWORK , M. NAOR , A. SAHAI . Concurrent zero-knowledge. Proc. 30th ACM STOC ’98 , 409 - 418
    4. 4)
      • C. RACKOFF , D. SIMON . Non-interactive zero-knowledge proof of knowledge and chosen cipher-text attacks. Cryptology—Crypto ’91 , 433 - 444
    5. 5)
      • B. Schneier . (1996) Applied cryptography: protocols, algorithms and source code in C.
    6. 6)
      • D.R. Stinson . (1995) Cryptography: theory and practice.
    7. 7)
      • M. BELLARE , P. ROGAWAY . Optimal asymmetric encryption. Eurocrypt ’94 , 92 - 111
    8. 8)
      • R. CRAMER , V. SHOUP . A practical public key crypto-system provable secure against adaptive chosen cipher-text attack. Cryptology—Crypto ’98 , 13 - 25
http://iet.metastore.ingenta.com/content/journals/10.1049/ip-cdt_20010207
Loading

Related content

content/journals/10.1049/ip-cdt_20010207
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address