Security and Privacy in Mobile Information and Communication Systems. Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers

Research Article

ID-Based Deniable Authentication Protocol Suitable for Mobile Devices

Download
392 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-30244-2_14,
        author={Jayaprakash Kar},
        title={ID-Based Deniable Authentication Protocol Suitable for Mobile Devices},
        proceedings={Security and Privacy in Mobile Information and Communication Systems. Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers},
        proceedings_a={MOBISEC},
        year={2012},
        month={10},
        keywords={deniable authentication ECDLP ECDHP HDDH mobile device},
        doi={10.1007/978-3-642-30244-2_14}
    }
    
  • Jayaprakash Kar
    Year: 2012
    ID-Based Deniable Authentication Protocol Suitable for Mobile Devices
    MOBISEC
    Springer
    DOI: 10.1007/978-3-642-30244-2_14
Jayaprakash Kar1,*
  • 1: King Abdulaziz University
*Contact email: jayaprakashkar@yahoo.com

Abstract

This paper describes a secure identity based deniable authentication protocol whose security is based on difficulty of breaking Diffie-Hellman Problem on Elliptic Curve (ECDHP) and hash function. Elliptic curve cryptosystem (ECC) has significant advantages like smaller key sizes, faster computations compared with other public-key cryptography. Since it is an ECC based authentication protocol, it can be implimented in mobile devices such as smart card, PDA etc. Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet.