Advertisement

Non-interactive Deniable Authentication Protocol Using Generalized ECDSA Signature Scheme

  • Jayaprakash Kar
Part of the Communications in Computer and Information Science book series (CCIS, volume 200)

Abstract

Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. This paper describes a secure non-interactive deniable authentication protocol using ECDSA signature scheme. The security of the protocol is based on difficulty of breaking Elliptic Curve Discrete Logarithm Problem. It can be implemented in low power and small processor mobile devices such as smart card, PDA etc which work in low power and small processor.

Keywords

deniable authentication ECDLP non-interactive ECDSA 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aumann, Y., Rabin, M.O.: Efficient Deniable Authentication of Long Messages. In: Int. Conf. on Theoretical Computer Science in Honour of Professor Manuel Blum’s 60th Birthday (1998), http://www.cs.cityu.edu.hk/dept/video.html
  2. 2.
    Boyd, C., Mao, W., Paterson, K.G.: Deniable authenticated key establishment for Internet protocols. In: 11th International Workshop on Security Protocols, Cambridge (UK) (April 2003)Google Scholar
  3. 3.
    Dwork, C., Naor, M., Sahai, A.: Concurrent zero-knowledge. In: Proc. 30th ACM STOC 1998, Dallas TX, USA, pp. 409–418 (1998)Google Scholar
  4. 4.
    Chou, J.S., Chen, Y.L., Huang, J.C.: A ID-Based Deniable Authentication Protocol on pairings. Cryptology ePrint Archive: Report (335) (2006)Google Scholar
  5. 5.
    Chou, J.S., Chen, Y.L., Yang, M.D.: Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols. Cryptology ePrint Archive: Report (451) (2005)Google Scholar
  6. 6.
    Kar, J.P., Majhi, B.: A Novel Deniable Authentication Protocol based on Diffie-Hellman Algorithm using Pairing techniques. In: ACM International Conference on Communication, Computing and Security (ICCCS 2011), India, pp. 493–498 (2011)Google Scholar
  7. 7.
    Deng, X., Lee, Lee, C.H., Zhu, H.: Deniable authentication protocols. IEEE Proc. Comput. Digit. Tech. 148(2), 101–104 (2001)CrossRefGoogle Scholar
  8. 8.
    Dwork, C., Naor, M., Sahai, A.: Concurrent zero-knowledge. In: Proc. 30th ACM STOC 1998, Dallas TX, USA, pp. 409–418 (1998)Google Scholar
  9. 9.
    Deng, X., Lee, C.H., Zhu, H.: Deniable authentication protocols. IEE Proceedings. Computers and Digital Techniques 148, 101–104 (2001)CrossRefGoogle Scholar
  10. 10.
    Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Improvement of Fan et al.’s Deniable Authentication Protocol based on Diffie-Hellman Algorithm. Applied Mathematics and Computation 167(1), 274–280 (2005)MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Zhu, R.W., Wong, D.S., Lee, C.H.: Cryptanalysis of a Suite of Deniable Authentication Protocols. IEEE Communication Letter 10(6), 504–506 (2006)CrossRefGoogle Scholar
  12. 12.
    Koblitz, N.: A course in Number Theory and Cryptography, 2nd edn. Springer, Heidelberg (1994)CrossRefzbMATHGoogle Scholar
  13. 13.
    Rosen, K.H.: Elementary Number Theory in Science and Communication, 2nd edn. Springer, Berlin (1986)Google Scholar
  14. 14.
    Menezes, A., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)zbMATHGoogle Scholar
  15. 15.
    Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)zbMATHGoogle Scholar
  16. 16.
    Certicom ECC Challenge and The Elliptic Curve Cryptosystem, http://www.certicom.com/index.php
  17. 17.
    Aumann, Y., Rabin, M.: Authentication, enhanced security and error correcting codes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 299–303. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  18. 18.
    Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. In: Cryptology ePrint Archive: Report 2004/332, http://eprint.iacr.org/2004/332

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Jayaprakash Kar
    • 1
  1. 1.Internet & e-Security, Department of Information TechnologyAl Musanna College of TechnologySultanate of Oman

Personalised recommendations