Skip to main content
Log in

Identity-based deniable authentication for ad hoc networks

  • Published:
Computing Aims and scope Submit manuscript

Abstract

Deniable authentication is an important security requirement for ad hoc networks. However, all known identity-based deniable authentication (IBDA) protocols are lack of formal security proof which is very important for cryptographic protocol design. In this paper, we propose a non-interactive IBDA protocol using bilinear pairings. Our protocol admits formal security proof in the random oracle model under the bilinear Diffie-Hellman assumption. Our protocol is faster than all known IBDA protocols of its type. In addition, our protocol supports batch verification that can speed up the verification of authenticators. This characteristic makes our protocol useful in ad hoc networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Tian X, Fang Y, Ideguchi T (2006) MATS: multichannel time-spread scheduling in mobile ad hoc networks. IEEE Trans Wireless Commun 5(3):612–621

    Article  Google Scholar 

  2. Li CT, Hwang MS, Liu CY (2008) An electronic voting protocol with deniable authentication for mobile ad hoc networks. Computer Commun 31(10):2534–2540

    Article  Google Scholar 

  3. Boneh D, Franklin M (2003) Identity-based encryption from the weil pairing. SIAM J Computing 32(3):586–615

    Article  MATH  MathSciNet  Google Scholar 

  4. Zhao S, Aggarwal A, Frost R, Bai X (2012) A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun Surveys Tutorials 14(2):380–400

    Article  Google Scholar 

  5. Shi Y, Li J (2005) Identity-based deniable authentication protocol. Electron Lett 41(5):241–242

    Article  MathSciNet  Google Scholar 

  6. Cao T, Lin D, Xue R (2005) An efficient ID-based deniable authentication protocol from pairings. Proc AINA 2005:388–391

    Google Scholar 

  7. Chou JS, Chen Y, Huang JC (2006) A ID-based deniable authentication protocol on pairings. Cryptology ePrint Archive. Report 2006/335

  8. Lim MH, Lee S, Park Y, Lee H (2007) An enhanced ID-based deniable authentication protocol on pairings. Proc ICCSA LNCS 4706:1008–1017

    Google Scholar 

  9. Lim MH, Lee S, Lee H (2008) Cryptanalysis on improved Chou et al’.s ID-based deniable authentication protocol. Proc ICISS 2008:87–93

    Google Scholar 

  10. Cha JC, Cheon JH (2003) An identity-based signature from gap Diffie-Hellman groups. Proc. PKC 2003 LNCS 2567:18–30

    MathSciNet  Google Scholar 

  11. Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361–396

    Article  MATH  Google Scholar 

  12. Scott M (2007) Efficient implementation of crytographic pairings. http://ecrypt-ss07.rhul.ac.uk/Slides/Thursday/mscott-samos07.pdf

  13. Chan ACF (2012) Distributed private key generation for identity based cryptosystems in ad hoc networks. IEEE Wireless Commun Lett 1(1):46–48

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fagen Li.

Additional information

This work is supported by the National Natural Science Foundation of China (Grant Nos. 60803133, 61073176, 61003230, 61003232, 61103207, 61272525 and 61272404).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, F., Xiong, P. & Jin, C. Identity-based deniable authentication for ad hoc networks. Computing 96, 843–853 (2014). https://doi.org/10.1007/s00607-013-0321-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00607-013-0321-5

Keywords

Mathematics Subject Classification (2000)

Navigation