Wireless Personal Communications

, Volume 55, Issue 1, pp 81–90 | Cite as

Robust Deniable Authentication Protocol

  • Eun-Jun Yoon
  • Kee-Young Yoo
  • Sang-Soo Yeo
  • Changhoon Lee
Article

Abstract

Deniable authentication protocol is a new technique of modern cryptography. The protocol not only enables an intended receiver to identify the source of a received message, but also prevents a third party from identifying the source of the message. Recently, Shao et al. pointed out that Wang et al.’s deniable authentication protocol based on ElGamal cryptosystem is insecure to a person-in-the-middle attack; that is, in the whole process, the receiver cannot be aware of the existence of this adversary as well as the modification of the messages. Furthermore, they also presented a modification of Wang et al.’s protocol to overcome the security flaw. However, this paper demonstrates that Shao et al.’s improved protocol is still susceptible to a malicious receiver’s impersonation attack. To mitigate this security breach, we propose a robust deniable authentication protocol based on ElGamal cryptography.

Keywords

Deniable authentication Cryptography Security ElGamal cryptography Electronic voting system 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Dwork, C., Naor, M., & Sahai, A. (1998). Concurrent zero-knowledge. In Proceedings of the 30th ACM STOC’98, Dallas, TX, USA, 409–418.Google Scholar
  2. 2.
    Aumann, Y., & Rabin, M. (1998). Efficient deniable authentication of long messages. In International Conference on Theoretical Computer Science in Honor of Professor Manuel Blum’s 60th birthday.Google Scholar
  3. 3.
    Deng X., Lee C. H., Zhu H. (2001) Deniable authentication protocols. IEE Proceedings Computers and Digital Techniques 148(2): 101–104CrossRefGoogle Scholar
  4. 4.
    Fan L., Xu C. X., Li J. H. (2002) Deniable authentication protocol based on Diffie-Hellman algorithm. Electronics letters 38(14): 705–706CrossRefGoogle Scholar
  5. 5.
    Hsieh B. T., Sun H. M. (2004) An improvement of a deniable authentication protocol. IEICE Transactions On Communications E87-B(10): 3099–3101Google Scholar
  6. 6.
    Shao Z. (2004) Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Computer Standards & Interfaces 26: 449–454CrossRefGoogle Scholar
  7. 7.
    Lu R., Cao Z. (2005) Non-interactive deniable authentication protocol based on factoring. Computer Standards & Interfaces 27: 401–405CrossRefGoogle Scholar
  8. 8.
    Yoon E. J., Yoo K. Y. (2005) Improvement of Fan et al.’s deniable authentication protocol based on Diffie-Hellman algorithm. Applied Mathematics and Computation 167: 274–280MATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Lu R., Cao Z. (2005) A new deniable authentication protocol from bilinear pairings. Applied Mathematics and Computation 168: 954–961MATHCrossRefMathSciNetGoogle Scholar
  10. 10.
    Wang Y., Li J., Tie L. (2005) A simple protocol for deniable authentication based on ElGamal cryptography. Networks 45: 193–194MATHCrossRefMathSciNetGoogle Scholar
  11. 11.
    Shao J., Cao Z., Lu R. (2006) An improved deniable authentication protocol. Networks 48: 179–181MATHCrossRefMathSciNetGoogle Scholar
  12. 12.
    Yoon, E. J., & Yoo, K. Y. (2006). Security analysis of Hsieh-Sun’s deniable authentication protocol. In 2006 International Conference on Hybrid Information Technology (ICHIT’06) (Vol. 2, pp. 45–48).Google Scholar
  13. 13.
    Lu R., Cao Z., Wang S., Bao H. (2007) A new ID-based deniable authentication protocol. Informatica 18: 67–78MATHMathSciNetGoogle Scholar
  14. 14.
    Yoon, E. J., & Yoo, K. Y. (2008). Secure deniable authentication protocol based on ElGamal cryptography, In 2008 International Conference on Information Security and Assurance (ISA’08) (pp. 36–39).Google Scholar
  15. 15.
    Lu R., Lin X., Cao Z., Qin L., Liang X. (2008) A simple deniable authentication protocol based on the Diffie-Hellman algorithm. International Journal of Computer Mathematics 85(9): 1315–1323MATHCrossRefMathSciNetGoogle Scholar
  16. 16.
    Diffie W., Hellman M. E. (1976) New directions in cryptography. IEEE Transactions on Information Theory 10(6): 644–654CrossRefMathSciNetGoogle Scholar
  17. 17.
    ElGamal T. (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31: 469–472MATHCrossRefMathSciNetGoogle Scholar
  18. 18.
    Menezes A. J., Oorschot P. C., Vanstone S. A. (1997) Handbook of applied cryptograph. CRC Press, New YorkGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC. 2009

Authors and Affiliations

  • Eun-Jun Yoon
    • 1
  • Kee-Young Yoo
    • 2
  • Sang-Soo Yeo
    • 3
  • Changhoon Lee
    • 4
  1. 1.School of Electrical Engineering and Computer ScienceKyungpook National UniversityDaeguSouth Korea
  2. 2.Department of Computer EngineeringKyungpook National UniversityDaeguSouth Korea
  3. 3.Division of Computer EngineeringMokwon UniversityTaejonSouth Korea
  4. 4.School of Computer EngineeringHanshin UniversityOsanSouth Korea

Personalised recommendations