Robust Deniable Authentication Protocol
- 100 Downloads
Deniable authentication protocol is a new technique of modern cryptography. The protocol not only enables an intended receiver to identify the source of a received message, but also prevents a third party from identifying the source of the message. Recently, Shao et al. pointed out that Wang et al.’s deniable authentication protocol based on ElGamal cryptosystem is insecure to a person-in-the-middle attack; that is, in the whole process, the receiver cannot be aware of the existence of this adversary as well as the modification of the messages. Furthermore, they also presented a modification of Wang et al.’s protocol to overcome the security flaw. However, this paper demonstrates that Shao et al.’s improved protocol is still susceptible to a malicious receiver’s impersonation attack. To mitigate this security breach, we propose a robust deniable authentication protocol based on ElGamal cryptography.
KeywordsDeniable authentication Cryptography Security ElGamal cryptography Electronic voting system
Unable to display preview. Download preview PDF.
- 1.Dwork, C., Naor, M., & Sahai, A. (1998). Concurrent zero-knowledge. In Proceedings of the 30th ACM STOC’98, Dallas, TX, USA, 409–418.Google Scholar
- 2.Aumann, Y., & Rabin, M. (1998). Efficient deniable authentication of long messages. In International Conference on Theoretical Computer Science in Honor of Professor Manuel Blum’s 60th birthday.Google Scholar
- 5.Hsieh B. T., Sun H. M. (2004) An improvement of a deniable authentication protocol. IEICE Transactions On Communications E87-B(10): 3099–3101Google Scholar
- 12.Yoon, E. J., & Yoo, K. Y. (2006). Security analysis of Hsieh-Sun’s deniable authentication protocol. In 2006 International Conference on Hybrid Information Technology (ICHIT’06) (Vol. 2, pp. 45–48).Google Scholar
- 14.Yoon, E. J., & Yoo, K. Y. (2008). Secure deniable authentication protocol based on ElGamal cryptography, In 2008 International Conference on Information Security and Assurance (ISA’08) (pp. 36–39).Google Scholar
- 18.Menezes A. J., Oorschot P. C., Vanstone S. A. (1997) Handbook of applied cryptograph. CRC Press, New YorkGoogle Scholar