International Journal of Network Security
Now-a-days, authentication had emerged to be an essential communication process in key establishment. Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. This paper describes a secure identity based deniable authentication protocol whose security is based on computational infeasibility of solving Diffie-Hellman Problem on Elliptic Curve (ECDHP).