Skip to main content
Log in

Cryptanalysis and Improvement of Robust Deniable Authentication Protocol

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A deniable authentication protocol enables a receiver to identify the source of a given message, but the receiver cannot prove the source of the message to a third party. Recently, Yoon et al. (Wirel Pers Commun 55:81–90, 2010) proposed a robust deniable authentication protocol based on ElGamal cryptosystem. Although they proved that their protocol satisfies the deniable authentication, mutual authentication and confidentiality, we show that their protocol does not satisfy the deniable authentication property. The receiver can prove the source of a given message to a third party. In addition, we propose an improved protocol that removes this weakness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

References

  1. Aumann, Y., & Rabin, M. (1998). Authentication enhanced security and error correcting codes. In Proceedings of advances in cryptology-CRYPTO’98 (pp. 299–303). Santa Barbara, CA, USA: LNCS 1462.

  2. Dwork, C., Naor M., & Sahai, A. (1998). Concurrent zero-knowledge. In Proceedings of 30th ACM symposium on theory of computing (pp. 409–418). TX, USA: Dallas.

  3. Aumann, Y., Rabin, M. (1998). Efficient deniable authentication of long messages. In International conference on theoretical computer science in honor of Professor Manuel Blum’s 60th birthday. http://www.cs.cityu.edu.hk/dept/video.html.

  4. Deng X., Lee C. H., Zhu H. (2001) Deniable authentication protocols. IEE Proceedings-Computers and Digital Techniques 148: 101–104

    Article  Google Scholar 

  5. Fan L., Xu C. X., Li J. H. (2002) Deniable authentication protocol based on Diffie-Hellman algorithm. Electronics Letters 38: 705–706

    Article  Google Scholar 

  6. Diffie W., Hellman M. E. (1976) New directions in cryptography. IEEE Transactions on Information Theory 22: 644–654

    Article  MathSciNet  MATH  Google Scholar 

  7. Yoon E. J., Ryu E. K., Yoo K. Y. (2005) Improvement of Fan et al.’s deniable authentication protocol based on Diffie-Hellman algorithm. Applied Mathematics and Computation 167: 274–280

    Article  MathSciNet  MATH  Google Scholar 

  8. Shao Z. (2004) Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Computer Standards Interfaces 26: 449–454

    Article  Google Scholar 

  9. Harn L. (1995) Design of generalised ElGamal type digital signature scheme based on discrete logarithm. Electronics Letters 31: 2025–2026

    Google Scholar 

  10. Lu R., Cao Z. (2005) Non-interactive deniable authentication protocol based on factoring. Computer Standards Interfaces 27: 401–405

    Article  Google Scholar 

  11. Wang Y., Li J., Tie L. (2005) A simple protocol for deniable authentication based on ElGamal cryptography. Networks 45: 193–194

    Article  MathSciNet  MATH  Google Scholar 

  12. ElGamal T. (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31: 469–472

    Article  MathSciNet  MATH  Google Scholar 

  13. Shao J., Cao Z., Lu R. (2006) An improved deniable authentication protocol. Networks 48: 179–181

    Article  MathSciNet  MATH  Google Scholar 

  14. Yoon E. J., Yoo K. Y., Yeo S. S., Lee C. (2010) Robust deniable authentication protocol. Wireless Personal Communications 55: 81–90

    Article  Google Scholar 

  15. Shoup, V. (2004). Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive: Report 2004/332 http://eprint.iacr.org/2004/332.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fagen Li.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, F., Takagi, T. Cryptanalysis and Improvement of Robust Deniable Authentication Protocol. Wireless Pers Commun 69, 1391–1398 (2013). https://doi.org/10.1007/s11277-012-0640-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-012-0640-4

Keywords

Navigation