About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Mobile Information and Communication Systems. Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers

Research Article

ID-Based Deniable Authentication Protocol Suitable for Mobile Devices

Download(Requires a free EAI acccount)
466 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-30244-2_14,
        author={Jayaprakash Kar},
        title={ID-Based Deniable Authentication Protocol Suitable for Mobile Devices},
        proceedings={Security and Privacy in Mobile Information and Communication Systems. Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers},
        proceedings_a={MOBISEC},
        year={2012},
        month={10},
        keywords={deniable authentication ECDLP ECDHP HDDH mobile device},
        doi={10.1007/978-3-642-30244-2_14}
    }
    
  • Jayaprakash Kar
    Year: 2012
    ID-Based Deniable Authentication Protocol Suitable for Mobile Devices
    MOBISEC
    Springer
    DOI: 10.1007/978-3-642-30244-2_14
Jayaprakash Kar1,*
  • 1: King Abdulaziz University
*Contact email: jayaprakashkar@yahoo.com

Abstract

This paper describes a secure identity based deniable authentication protocol whose security is based on difficulty of breaking Diffie-Hellman Problem on Elliptic Curve (ECDHP) and hash function. Elliptic curve cryptosystem (ECC) has significant advantages like smaller key sizes, faster computations compared with other public-key cryptography. Since it is an ECC based authentication protocol, it can be implimented in mobile devices such as smart card, PDA etc. Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet.

Keywords
deniable authentication ECDLP ECDHP HDDH mobile device
Published
2012-10-22
http://dx.doi.org/10.1007/978-3-642-30244-2_14
Copyright © 2011–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL