Cryptanalysis and improvement of robust deniable authentication protocol

Fagen Li, Tsuyoshi Takagi

Research output: Contribution to journalArticle

13 Citations (Scopus)

Abstract

A deniable authentication protocol enables a receiver to identify the source of a given message, but the receiver cannot prove the source of the message to a third party. Recently, Yoon et al. (Wirel Pers Commun 55:81-90, 2010) proposed a robust deniable authentication protocol based on ElGamal cryptosystem. Although they proved that their protocol satisfies the deniable authentication, mutual authentication and confidentiality, we show that their protocol does not satisfy the deniable authentication property. The receiver can prove the source of a given message to a third party. In addition, we propose an improved protocol that removes this weakness.

Original languageEnglish
Pages (from-to)1391-1398
Number of pages8
JournalWireless Personal Communications
Volume69
Issue number4
DOIs
Publication statusPublished - Apr 1 2013

Fingerprint

Authentication
Cryptography

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Electrical and Electronic Engineering

Cite this

Cryptanalysis and improvement of robust deniable authentication protocol. / Li, Fagen; Takagi, Tsuyoshi.

In: Wireless Personal Communications, Vol. 69, No. 4, 01.04.2013, p. 1391-1398.

Research output: Contribution to journalArticle

Li, Fagen ; Takagi, Tsuyoshi. / Cryptanalysis and improvement of robust deniable authentication protocol. In: Wireless Personal Communications. 2013 ; Vol. 69, No. 4. pp. 1391-1398.
@article{b2525b4cfb5743848f0ccb41668d5a92,
title = "Cryptanalysis and improvement of robust deniable authentication protocol",
abstract = "A deniable authentication protocol enables a receiver to identify the source of a given message, but the receiver cannot prove the source of the message to a third party. Recently, Yoon et al. (Wirel Pers Commun 55:81-90, 2010) proposed a robust deniable authentication protocol based on ElGamal cryptosystem. Although they proved that their protocol satisfies the deniable authentication, mutual authentication and confidentiality, we show that their protocol does not satisfy the deniable authentication property. The receiver can prove the source of a given message to a third party. In addition, we propose an improved protocol that removes this weakness.",
author = "Fagen Li and Tsuyoshi Takagi",
year = "2013",
month = "4",
day = "1",
doi = "10.1007/s11277-012-0640-4",
language = "English",
volume = "69",
pages = "1391--1398",
journal = "Wireless Personal Communications",
issn = "0929-6212",
publisher = "Springer Netherlands",
number = "4",

}

TY - JOUR

T1 - Cryptanalysis and improvement of robust deniable authentication protocol

AU - Li, Fagen

AU - Takagi, Tsuyoshi

PY - 2013/4/1

Y1 - 2013/4/1

N2 - A deniable authentication protocol enables a receiver to identify the source of a given message, but the receiver cannot prove the source of the message to a third party. Recently, Yoon et al. (Wirel Pers Commun 55:81-90, 2010) proposed a robust deniable authentication protocol based on ElGamal cryptosystem. Although they proved that their protocol satisfies the deniable authentication, mutual authentication and confidentiality, we show that their protocol does not satisfy the deniable authentication property. The receiver can prove the source of a given message to a third party. In addition, we propose an improved protocol that removes this weakness.

AB - A deniable authentication protocol enables a receiver to identify the source of a given message, but the receiver cannot prove the source of the message to a third party. Recently, Yoon et al. (Wirel Pers Commun 55:81-90, 2010) proposed a robust deniable authentication protocol based on ElGamal cryptosystem. Although they proved that their protocol satisfies the deniable authentication, mutual authentication and confidentiality, we show that their protocol does not satisfy the deniable authentication property. The receiver can prove the source of a given message to a third party. In addition, we propose an improved protocol that removes this weakness.

UR - http://www.scopus.com/inward/record.url?scp=84879686687&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84879686687&partnerID=8YFLogxK

U2 - 10.1007/s11277-012-0640-4

DO - 10.1007/s11277-012-0640-4

M3 - Article

AN - SCOPUS:84879686687

VL - 69

SP - 1391

EP - 1398

JO - Wireless Personal Communications

JF - Wireless Personal Communications

SN - 0929-6212

IS - 4

ER -