2007
DOI: 10.1016/j.ins.2006.09.020
|View full text |Cite
|
Sign up to set email alerts
|

A novel deniable authentication protocol using generalized ElGamal signature scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(24 citation statements)
references
References 10 publications
0
24
0
Order By: Relevance
“…Because some interactive DAPs (Dwork et al, 1998;Aumann and Rabin, 1998;Deng et al, 2001;Fan et al, 2002) do not satisfy the intended receiver property (Shao, 2004), the first non-interactive DAP based on the generalized ElGamal signature scheme is described in Shao (2004). To reduce the communication cost between the sender and receiver, Lee et al (2007) provided a non-interactive protocol based on the generalized ElGamal signature scheme. To prove deniability and unforgeability, a security model based on designated verifier proofs (Wang and Song, 2009) was proposed for non-interactive DAPs.…”
Section: Deniable Authentication Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…Because some interactive DAPs (Dwork et al, 1998;Aumann and Rabin, 1998;Deng et al, 2001;Fan et al, 2002) do not satisfy the intended receiver property (Shao, 2004), the first non-interactive DAP based on the generalized ElGamal signature scheme is described in Shao (2004). To reduce the communication cost between the sender and receiver, Lee et al (2007) provided a non-interactive protocol based on the generalized ElGamal signature scheme. To prove deniability and unforgeability, a security model based on designated verifier proofs (Wang and Song, 2009) was proposed for non-interactive DAPs.…”
Section: Deniable Authentication Protocolsmentioning
confidence: 99%
“…To improve the efficiency of the Hwang and Ma protocol, Hwang and Chao (2009) proposed the noninteractive DAP with anonymity and sender protection. However, non-interactive DAPs (Shao, 2004;Lee et al, 2007;Wang and Song, 2009;Susilo and Mu, 2004a,b;Ma, 2007, 2008;Hwang and Chao, 2009) do not provide confidentiality.…”
Section: Deniable Authentication Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…So far, many password-based user authentication schemes have been proposed [3][4][5][6]12,13,15,17,19,24,[33][34][35]. However, they only provide a service to verify the login user's identity.…”
Section: Motivationsmentioning
confidence: 99%
“…Unfortunately, Yoon et al [5] found that their protocol suffers from the intruder masquerading attack and subsequently proposed their enhanced version. Thereafter, various deniable authentication protocols have been devised [6,7] . However, the security of these protocols are mainly based on the assumptions of computational complexity, and they are vulnerable to the strong ability of some advanced quantum algorithms [8,9].…”
Section: Introductionmentioning
confidence: 99%