@ARTICLE{ :/content/journals/10.1049/ip-cdt_20010207, author = {X. Deng}, author = {C.H. Lee}, author = {H. Zhu}, keywords = {intractability;computation cost;deniable authentication protocols;message block;factoring problem;discrete logarithm problem;}, ISSN = {1350-2387}, language = {English}, abstract = {Two deniable authentication schemes have been developed. One is based on the intractability of the factoring problem, and the other is based on the intractability of the discrete logarithm problem. The computation cost of the first scheme is about (t+2)/2s. The second scheme requires about (2t+3)/4s of a previous scheme; s is the length of a message block and t is the cost of multiplication mod N operations. It is shown that both protocols reserve all cryptographic characterisations of the previous scheme.}, title = {Deniable authentication protocols}, journal = {IEE Proceedings - Computers and Digital Techniques}, issue = {2}, volume = {148}, year = {2001}, month = {March}, pages = {101-104(3)}, publisher ={}, copyright = {IEE}, url = {https://digital-library.theiet.org/;jsessionid=2c08y136rn8xr.x-iet-live-01content/journals/10.1049/ip-cdt_20010207} }