Composability and on-line deniability of authentication

Y Dodis, J Katz, A Smith, S Walfish - Theory of Cryptography: 6th Theory of …, 2009 - Springer
Protocols for deniable authentication achieve seemingly paradoxical guarantees: upon
completion of the protocol the receiver is convinced that the sender authenticated the …

An efficient deniable key exchange protocol

S Jiang, R Safavi-Naini - Financial Cryptography and Data Security: 12th …, 2008 - Springer
A deniable key exchange allows two parties to jointly share a secret key while neither of two
nor an outsider can prove to a third party that the communication between the two …

ID-based deniable authentication protocol based on Diffie-Hellman problem on elliptic curve

J Kar - International Journal of Network Security, Taiwan, 2013 - kau.edu.sa
Deniable authentication protocol enables a receiver to identify the true source of a given
message, but not to prove the identity of the sender to a third party. This property is very …

An enhanced ID-based deniable authentication protocol on pairings

MH Lim, S Lee, Y Park, H Lee - … Science and Its Applications–ICCSA 2007 …, 2007 - Springer
Deniability is defined as a privacy property which enables protocol principals to deny their
involvement after they had taken part in a particular protocol run. Lately, Chou et al. had …

[图书][B] Enhanced security models for network protocols

S Walfish - 2008 - search.proquest.com
Modeling security for protocols running in the complex network environment of the Internet
can be a daunting task. Ideally, a security model for the Internet should provide the following …

Concurrently Deniable Group Key Agreement and Its Application to Privacy‐Preserving VANETs

S Zeng, Y Chen - Wireless Communications and Mobile …, 2018 - Wiley Online Library
VANETs need secure communication. Authentication in VANETs resists the attack on the
receipt of false information. Authenticated group key agreement (GKA) is used to establish a …

[HTML][HTML] Timed encryption with application to deniable key exchange

S Jiang - Theoretical Computer Science, 2014 - Elsevier
In this paper, we propose a new notion of timed encryption, in which the encryption is secure
within time t while it is completely insecure after some time T> t. We consider the setting …

[PDF][PDF] 两轮次的可否认的群密钥协商协议

陈勇, 何明星, 曾晟珂, 李虓 - 密码学报, 2016 - jcr.cacrnet.org.cn
可否认的群密钥协商协议是指两方或多方参与者在一个开放的公共信道上通过协商得到一个
共享的会话密钥, 并利用该会话密钥建立一个安全的保密信道. 同时, 协议的可否认性使得在协商 …

适用于多方协议的可否认认证

陈勇, 鲁龙, 曾晟珂, 何明星 - 网络与信息安全学报, 2016 - infocomm-journal.com
可否认认证不仅可以像数字签名那样实现消息认证, 且非公开可验证性使其可以满足许多签名
不能满足的需求, 如隐私保护等. 研究了如何在多方协议中实现完全可否认认证 …

Id-based deniable authentication protocol suitable for mobile devices

J Kar - Security and Privacy in Mobile Information and …, 2012 - Springer
This paper describes a secure identity based deniable authentication protocol whose
security is based on difficulty of breaking Diffie-Hellman Problem on Elliptic Curve (ECDHP) …