会议专题

ID-based non-interactive deniable authentication protocol

Non-interactive deniable authentication protocol is vulnerable to the receiver key-compromise impersonation attack, which are owing to the reason that the authentication message is computed from the receivers private and some other public values. Consequently, in order to be suitable for evaluation the security of non-interactive deniable authentication protocol, we have to re-define the attribute of keycompromise impersonation as the attribute of sender key-compromise impersonation, then proposes an simple and efficient ID-based non-interactive deniable authentication protocol. The proposed protocol has no need for use of an additional signature to provide extra authentication, and satisfies authenticity, deniability and sender key-compromise impersonation security attributes simultaneously.

SHI wei-min

College of Computer Science and Technology,Beijing University of Technology,Beijing 100124,China

国际会议

The Fifth International Conference on Information Assurance and Security(第五届信息保障与安全国际会议)

西安

英文

479-482

2009-08-18(万方平台首次上网日期,不代表论文的发表时间)