Abstract
A deniable authentication protocol enables a receiver to identify the source of a given message, but the receiver cannot prove the source of the message to a third party. Recently, Yoon et al. (Wirel Pers Commun 55:81–90, 2010) proposed a robust deniable authentication protocol based on ElGamal cryptosystem. Although they proved that their protocol satisfies the deniable authentication, mutual authentication and confidentiality, we show that their protocol does not satisfy the deniable authentication property. The receiver can prove the source of a given message to a third party. In addition, we propose an improved protocol that removes this weakness.
References
Aumann, Y., & Rabin, M. (1998). Authentication enhanced security and error correcting codes. In Proceedings of advances in cryptology-CRYPTO’98 (pp. 299–303). Santa Barbara, CA, USA: LNCS 1462.
Dwork, C., Naor M., & Sahai, A. (1998). Concurrent zero-knowledge. In Proceedings of 30th ACM symposium on theory of computing (pp. 409–418). TX, USA: Dallas.
Aumann, Y., Rabin, M. (1998). Efficient deniable authentication of long messages. In International conference on theoretical computer science in honor of Professor Manuel Blum’s 60th birthday. http://www.cs.cityu.edu.hk/dept/video.html.
Deng X., Lee C. H., Zhu H. (2001) Deniable authentication protocols. IEE Proceedings-Computers and Digital Techniques 148: 101–104
Fan L., Xu C. X., Li J. H. (2002) Deniable authentication protocol based on Diffie-Hellman algorithm. Electronics Letters 38: 705–706
Diffie W., Hellman M. E. (1976) New directions in cryptography. IEEE Transactions on Information Theory 22: 644–654
Yoon E. J., Ryu E. K., Yoo K. Y. (2005) Improvement of Fan et al.’s deniable authentication protocol based on Diffie-Hellman algorithm. Applied Mathematics and Computation 167: 274–280
Shao Z. (2004) Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Computer Standards Interfaces 26: 449–454
Harn L. (1995) Design of generalised ElGamal type digital signature scheme based on discrete logarithm. Electronics Letters 31: 2025–2026
Lu R., Cao Z. (2005) Non-interactive deniable authentication protocol based on factoring. Computer Standards Interfaces 27: 401–405
Wang Y., Li J., Tie L. (2005) A simple protocol for deniable authentication based on ElGamal cryptography. Networks 45: 193–194
ElGamal T. (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31: 469–472
Shao J., Cao Z., Lu R. (2006) An improved deniable authentication protocol. Networks 48: 179–181
Yoon E. J., Yoo K. Y., Yeo S. S., Lee C. (2010) Robust deniable authentication protocol. Wireless Personal Communications 55: 81–90
Shoup, V. (2004). Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive: Report 2004/332 http://eprint.iacr.org/2004/332.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, F., Takagi, T. Cryptanalysis and Improvement of Robust Deniable Authentication Protocol. Wireless Pers Commun 69, 1391–1398 (2013). https://doi.org/10.1007/s11277-012-0640-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-012-0640-4