Research Article
ID-Based Deniable Authentication Protocol Suitable for Mobile Devices
420 downloads
@INPROCEEDINGS{10.1007/978-3-642-30244-2_14, author={Jayaprakash Kar}, title={ID-Based Deniable Authentication Protocol Suitable for Mobile Devices}, proceedings={Security and Privacy in Mobile Information and Communication Systems. Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers}, proceedings_a={MOBISEC}, year={2012}, month={10}, keywords={deniable authentication ECDLP ECDHP HDDH mobile device}, doi={10.1007/978-3-642-30244-2_14} }
- Jayaprakash Kar
Year: 2012
ID-Based Deniable Authentication Protocol Suitable for Mobile Devices
MOBISEC
Springer
DOI: 10.1007/978-3-642-30244-2_14
Abstract
This paper describes a secure identity based deniable authentication protocol whose security is based on difficulty of breaking Diffie-Hellman Problem on Elliptic Curve (ECDHP) and hash function. Elliptic curve cryptosystem (ECC) has significant advantages like smaller key sizes, faster computations compared with other public-key cryptography. Since it is an ECC based authentication protocol, it can be implimented in mobile devices such as smart card, PDA etc. Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet.
Copyright © 2011–2024 ICST