Security

A Novel Non-Interactive Deniable Authentication Protocol With Designated Verifier on Elliptic Curve Cryptosystem

Date Added: Oct 2010
Format: PDF

Recently, many Non-Interactive Deniable Authentication (NIDA) protocols have been proposed. They are mainly composed of two types, signature-based and shared-secrecy based. After reviewing these schemes, the authors found that the signature-based approach can not deny the source of the message and thus can not achieve full deniability; and that, the shared-secrecy based approach suffers KCI attack although it can achieve full deniability. In addition, both types of schemes lack efficiency consideration for they mainly base on DLP, factoring, or bilinear pairing.