Skip to main content

2017 | OriginalPaper | Buchkapitel

Efficient and Short Identity-Based Deniable Authenticated Encryption

verfasst von : Chunhua Jin, Jianyang Zhao

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Deniable authentication is an important security requirement for many applications that require user privacy protection, since the sender can deny that he/she has signed the message. Considering the importance of communication efficiency, in this paper, we explore the novel deniable authenticated encryption, which outperforms the existing ones in terms of communication costs and ciphertext size. Our protocol meets all the security requirement of message confidentiality and deniable message authentication. Our protocol is based on identity cryptography and can avoid the public key certificates based public key infrastructure (PKI). Our protocol is provably secure in the random oracle model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Dwork, C., Naor, M., Sahai, A.: Concurrent zero-knowledge. In: Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing Symposium on Theory of Computing (STOC 1998), Texas, USA, pp. 409–418 (1998) Dwork, C., Naor, M., Sahai, A.: Concurrent zero-knowledge. In: Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing Symposium on Theory of Computing (STOC 1998), Texas, USA, pp. 409–418 (1998)
2.
Zurück zum Zitat Wang, B., Song, Z.: A non-interactive deniable authentication scheme based on designated verifier proofs. J. Inf. Sci. 179(6), 858–865 (2009)CrossRefMATHMathSciNet Wang, B., Song, Z.: A non-interactive deniable authentication scheme based on designated verifier proofs. J. Inf. Sci. 179(6), 858–865 (2009)CrossRefMATHMathSciNet
4.
Zurück zum Zitat Tian, H., Chen, X., Jiang, Z.: Non-interactive deniable authentication protocols. In: Wu, C.-K., Yung, M., Lin, D. (eds.) Inscrypt 2011. LNCS, vol. 7537, pp. 142–159. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34704-7_12 CrossRef Tian, H., Chen, X., Jiang, Z.: Non-interactive deniable authentication protocols. In: Wu, C.-K., Yung, M., Lin, D. (eds.) Inscrypt 2011. LNCS, vol. 7537, pp. 142–159. Springer, Heidelberg (2012). doi:10.​1007/​978-3-642-34704-7_​12 CrossRef
5.
Zurück zum Zitat Youn, T., Lee, C., Park, Y.: An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes. Comput. Commun. 34(3), 353–357 (2011)CrossRef Youn, T., Lee, C., Park, Y.: An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes. Comput. Commun. 34(3), 353–357 (2011)CrossRef
6.
Zurück zum Zitat Chen, Y., Chou, J.: ECC-Based non-interactive deniable authentication with designated verifier. IACR Cryptology ePrint Archive, p. 783 (2013) Chen, Y., Chou, J.: ECC-Based non-interactive deniable authentication with designated verifier. IACR Cryptology ePrint Archive, p. 783 (2013)
7.
Zurück zum Zitat Li, F., Xiong, P., Jin, C.: Identity-based deniable authentication for Ad Hoc networks. Computing 96(9), 843–853 (2014)CrossRefMATH Li, F., Xiong, P., Jin, C.: Identity-based deniable authentication for Ad Hoc networks. Computing 96(9), 843–853 (2014)CrossRefMATH
8.
Zurück zum Zitat Gambs, S., Onete, C., Robert, J.: Prover anonymous and deniable distance-bounding authentication. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 501–506. ACM (2014) Gambs, S., Onete, C., Robert, J.: Prover anonymous and deniable distance-bounding authentication. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 501–506. ACM (2014)
9.
Zurück zum Zitat Shi, W., Zhang, J., Zhou, Y., Yang, Y.G.: A novel quantum deniable authentication protocol without entanglement. Quantum Inf. Process. 14(6), 2183–2193 (2015)CrossRefMATHMathSciNet Shi, W., Zhang, J., Zhou, Y., Yang, Y.G.: A novel quantum deniable authentication protocol without entanglement. Quantum Inf. Process. 14(6), 2183–2193 (2015)CrossRefMATHMathSciNet
10.
Zurück zum Zitat Zeng, S., Chen, Y., Tan, S., He, M.: Concurrently deniable ring authentication and its application to LBS in VANETs. Peer-to-Peer Netw. Appl. 10, 1–13 (2016) Zeng, S., Chen, Y., Tan, S., He, M.: Concurrently deniable ring authentication and its application to LBS in VANETs. Peer-to-Peer Netw. Appl. 10, 1–13 (2016)
11.
Zurück zum Zitat Li, F., Hong, J., Omala, A.: Practical deniable authentication for pervasive computing environments. Wireless Netw. 1–11 (2016) Li, F., Hong, J., Omala, A.: Practical deniable authentication for pervasive computing environments. Wireless Netw. 1–11 (2016)
12.
Zurück zum Zitat Harn, L., Ren, J.: Design of fully deniable authentication service for e-mail applications. Commun. Lett. 12(3), 219–221 (2008)CrossRef Harn, L., Ren, J.: Design of fully deniable authentication service for e-mail applications. Commun. Lett. 12(3), 219–221 (2008)CrossRef
13.
Zurück zum Zitat Lu, R., Lin, X., Cao, Z., Qin, L., Liang, X.: A simple deniable authentication protocol based on the Diffie-Hellman algorithm. Int. J. Comput. Math. 85(9), 1315–1323 (2008)CrossRefMATHMathSciNet Lu, R., Lin, X., Cao, Z., Qin, L., Liang, X.: A simple deniable authentication protocol based on the Diffie-Hellman algorithm. Int. J. Comput. Math. 85(9), 1315–1323 (2008)CrossRefMATHMathSciNet
14.
Zurück zum Zitat Yoon, E., Yoo, K., Yeo, S., Lee, C.: Robust deniable authentication protocol. Wireless Pers. Commun. 55(1), 81–90 (2010)CrossRef Yoon, E., Yoo, K., Yeo, S., Lee, C.: Robust deniable authentication protocol. Wireless Pers. Commun. 55(1), 81–90 (2010)CrossRef
15.
Zurück zum Zitat Li, F., Takagi, T.: Cryptanalysis and improvement of robust deniable authentication protocol. Wireless Pers. Commun. 69(4), 1391–1398 (2013)CrossRef Li, F., Takagi, T.: Cryptanalysis and improvement of robust deniable authentication protocol. Wireless Pers. Commun. 69(4), 1391–1398 (2013)CrossRef
16.
Zurück zum Zitat Hwang, S., Sung, Y.: Confidential deniable authentication using promised signcryption. J. Syst. Softw. 84(10), 1652–1659 (2011)CrossRef Hwang, S., Sung, Y.: Confidential deniable authentication using promised signcryption. J. Syst. Softw. 84(10), 1652–1659 (2011)CrossRef
17.
Zurück zum Zitat Harn, L., Lee, C., Lin, C., Chang, C.C.: Fully deniable message authentication protocols preserving confidentiality. Comput. J. 54(10), 1688–1699 (2011)CrossRef Harn, L., Lee, C., Lin, C., Chang, C.C.: Fully deniable message authentication protocols preserving confidentiality. Comput. J. 54(10), 1688–1699 (2011)CrossRef
18.
Zurück zum Zitat Hwang, S., Sung, Y., Chi, J.: Deniable authentication protocols with confidentiality and anonymous fair protections. In: Pan, J.S., Yang, C.N., Lin, C.C. (eds.) Advances in Intelligent Systems and Applications, vol. 21, pp. 41–51. Springer, Heidelberg (2012). doi:10.1007/978-3-642-35473-1_5 Hwang, S., Sung, Y., Chi, J.: Deniable authentication protocols with confidentiality and anonymous fair protections. In: Pan, J.S., Yang, C.N., Lin, C.C. (eds.) Advances in Intelligent Systems and Applications, vol. 21, pp. 41–51. Springer, Heidelberg (2012). doi:10.​1007/​978-3-642-35473-1_​5
19.
Zurück zum Zitat Li, F., Zhong, D., Takagi, T.: Efficient deniably authenticated encryption and its application to e-mail. IEEE Trans. Inf. Forensics Secur. 11(11), 2477–2486 (2016)CrossRef Li, F., Zhong, D., Takagi, T.: Efficient deniably authenticated encryption and its application to e-mail. IEEE Trans. Inf. Forensics Secur. 11(11), 2477–2486 (2016)CrossRef
20.
Zurück zum Zitat Wu, W., Li, F.: An efficient identity-based deniable authenticated encryption scheme. KSII Trans. Internet Inf. Syst. (TIIS) 9(5), 1904–1919 (2015) Wu, W., Li, F.: An efficient identity-based deniable authenticated encryption scheme. KSII Trans. Internet Inf. Syst. (TIIS) 9(5), 1904–1919 (2015)
21.
Zurück zum Zitat Li, F., Zheng, Z., Jin, C.: Identity-based deniable authenticated encryption and its application to e-mail system. Telecommun. Syst. 62(4), 625–639 (2016)CrossRef Li, F., Zheng, Z., Jin, C.: Identity-based deniable authenticated encryption and its application to e-mail system. Telecommun. Syst. 62(4), 625–639 (2016)CrossRef
22.
Zurück zum Zitat Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) \( \ll \) cost(signature) + cost(encryption). In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, pp. 165–179. Springer, Heidelberg (1997). doi:10.1007/BFb0052234 CrossRef Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) \( \ll \) cost(signature) + cost(encryption). In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, pp. 165–179. Springer, Heidelberg (1997). doi:10.​1007/​BFb0052234 CrossRef
23.
Zurück zum Zitat Choon, J.C., Hee Cheon, J.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2003). doi:10.1007/3-540-36288-6_2 CrossRef Choon, J.C., Hee Cheon, J.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2003). doi:10.​1007/​3-540-36288-6_​2 CrossRef
24.
25.
Zurück zum Zitat Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Crypto. 13(3), 61–396 (2003)MATH Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Crypto. 13(3), 61–396 (2003)MATH
Metadaten
Titel
Efficient and Short Identity-Based Deniable Authenticated Encryption
verfasst von
Chunhua Jin
Jianyang Zhao
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-68542-7_20