International Journal of Network Security
A deniable authentication protocol allows a sender to transfer an authenticated message to a receiver and the receiver cannot prove to a third party about the source of the message. In 2006, the researchers analyzed deniable authentication protocols proposed by them in 2001, which were based on a protocol proposed by them in 1998. In this paper, the authors show that the modified protocols by them, suffer from a Byzantine attack when two sessions run concurrently. They also suggest methods to solve the problem.