期刊文献+

A Deniable Authenticated Key Agreement Protocol

A Deniable Authenticated Key Agreement Protocol
原文传递
导出
摘要 This paper presents a deniable authenticated key agreement protocol. This protocol can provide an authenticated session key while the sender and the receiver can deny their involvement in such a protocol if the protocol is executed successfully. Then both can deny their transmitted messages protected by the authenticated session key. If this protocol fails, no authenticated session key can be established and no protected messages can be transmitted. The protocol can be proved secure against key compromise impersonation attack. The protocol employs a new method to isolate a session key from confirmation keys. This paper presents a deniable authenticated key agreement protocol. This protocol can provide an authenticated session key while the sender and the receiver can deny their involvement in such a protocol if the protocol is executed successfully. Then both can deny their transmitted messages protected by the authenticated session key. If this protocol fails, no authenticated session key can be established and no protected messages can be transmitted. The protocol can be proved secure against key compromise impersonation attack. The protocol employs a new method to isolate a session key from confirmation keys.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期645-650,共6页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China (60473027, 60773202) Foundation of Sun Yat-Sen University (35000-2910025,35000-3171912)
关键词 deniable authentication key agreement key compromise impersonation deniable authentication key agreement key compromise impersonation
  • 相关文献

参考文献10

  • 1Deng X,Lee C H,Zhu H.Deniable Authentication Protocols[].Computers and Digital Techniques IEE Proceedings.2001
  • 2Chou J S,Chen Y L,Huang J C.A ID-Based Deniable Au- thentication Protocol on Pairings. http://eprint.iacr.org/2006/335.pdf . 2007
  • 3Chou J S,Chen Y L,Yang M D.Weaknesses of the Boyd-Mao Deniable Authenticated Key Establishment for Internet Protocols. http://eprint. iacr. org/2005/451.pdf . 2007
  • 4Yoon E J,Ryu E K,Yoo K Y.Improvement of Fan et al. Deniable Authenticatio Protocol Based on Die-Hellman Al- gorithm[].Journal of Applied Mathematics.2005
  • 5Aumann Y,Michael O R.Efficient Deniable Authentication of Long Messages. http://www.cs.cityu.edu. hk/video/manuel/lecture/t5t1112.rm . 2007
  • 6Lim M,Lee S,Park Y, et al.An Enhanced ID-Based Deniable Authentication Protocol on Pairings. http://eprint.iacr.org/2007/113.pdf . 2007
  • 7Cheng Z,Nistazakis M,Comley R, et al.On the Indistin- guishability-Based Security Model of Key Agreement Proto- cols-Simple Cases. http://eprint.iacr. org/2005/129.pdf . 2007
  • 8Bao F,Deng R H,Zhu H F.Variations of Die-Hellman Prob- lem[].Proceedings of the Fifth Conference on Information and Communications Security.1998
  • 9Zhu RW,Wong DS,Lee CH.Cryptanalysis of a suite of deniable authentication protocols[].IEEE Communications Letters.2006
  • 10Dolev,D.,Dwork,C.,Naor,M.Non-malleable cryptography[].SIAM Journal on Computing.2000

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部