Loading…
A new non-interactive deniable authentication protocol based on generalized ElGamal signature scheme
A deniable authentication protocol enables a receiver to identify the source of a given message, but not to prove the identity of the sender to any third party. This can be very useful in e-government or e-commerce, such as in e-voting or online negotiation. The notion of "non-interactive"...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | A deniable authentication protocol enables a receiver to identify the source of a given message, but not to prove the identity of the sender to any third party. This can be very useful in e-government or e-commerce, such as in e-voting or online negotiation. The notion of "non-interactive" was first proposed by Z. Shao[1], after that, many non-interactive deniable authentication protocols were proposed. Non-interactive protocols are more efficient than interactive protocols because the information transmitted is much less. The proposed protocol is based on generalized ElGamal signature scheme, it can be and only can be authenticated by the intended receiver, and it is deniable. Moreover, it can withstand forgery and impersonate attacks. |
---|---|
DOI: | 10.1109/ITAIC.2011.6030184 |