The development of deniable authentication protocol based on the bivariate function hard problem
A deniable authentication protocol enables a receiver to identify the true source of a given message but not to prove the identity of the sender to the third party. Non-interactive protocol is more efficient than interactive protocol in terms of communication overhead, and thus several non-interacti...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Femto Technique
2016
|
Online Access: | http://psasir.upm.edu.my/id/eprint/3638/1/The%20development%20of%20deniable%20authentication%20protocol%20based%20on%20the%20bivariate%20function%20hard%20problem.pdf http://psasir.upm.edu.my/id/eprint/3638/ http://ijns.jalaxy.com.tw/contents/ijns-v18-n1/ijns-v18-n1.html |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.upm.eprints.3638 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.36382016-06-20T05:40:23Z http://psasir.upm.edu.my/id/eprint/3638/ The development of deniable authentication protocol based on the bivariate function hard problem Nek Abdul Rahman, Normahirah Kamel Ariffin, Muhammad Rezal A deniable authentication protocol enables a receiver to identify the true source of a given message but not to prove the identity of the sender to the third party. Non-interactive protocol is more efficient than interactive protocol in terms of communication overhead, and thus several non-interactive deniable authentication protocols have been proposed. So, it is very necessary to design a deniable authentication protocol which is non-interactive, secure and efficient. This paper proposes a deniable authentication protocol based on the bivariate function hard problem (BFHP) cryptographic primitive. An improvement based on the BFHP is suggested since the problem of the BFHP provides the needed security elements plus its fast execution time. At the same time, the proposed protocol has properties of completeness, deniability, security of forgery attack, security of impersonation attack and security man-in-the-middle attack also has been proved. Femto Technique 2016 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/3638/1/The%20development%20of%20deniable%20authentication%20protocol%20based%20on%20the%20bivariate%20function%20hard%20problem.pdf Nek Abdul Rahman, Normahirah and Kamel Ariffin, Muhammad Rezal (2016) The development of deniable authentication protocol based on the bivariate function hard problem. International Journal of Network Security, 18 (1). pp. 151-157. ISSN 1816-353X; ESSN: 1816-3548 http://ijns.jalaxy.com.tw/contents/ijns-v18-n1/ijns-v18-n1.html |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
language |
English |
description |
A deniable authentication protocol enables a receiver to identify the true source of a given message but not to prove the identity of the sender to the third party. Non-interactive protocol is more efficient than interactive protocol in terms of communication overhead, and thus several non-interactive deniable authentication protocols have been proposed. So, it is very necessary to design a deniable authentication protocol which is non-interactive, secure and efficient. This paper proposes a deniable authentication protocol based on the bivariate function hard problem (BFHP) cryptographic primitive. An improvement based on the BFHP is suggested since the problem of the BFHP provides the needed security elements plus its fast execution time. At the same time, the proposed protocol has properties of completeness, deniability, security of forgery attack, security of impersonation attack and security man-in-the-middle attack also has been proved. |
format |
Article |
author |
Nek Abdul Rahman, Normahirah Kamel Ariffin, Muhammad Rezal |
spellingShingle |
Nek Abdul Rahman, Normahirah Kamel Ariffin, Muhammad Rezal The development of deniable authentication protocol based on the bivariate function hard problem |
author_facet |
Nek Abdul Rahman, Normahirah Kamel Ariffin, Muhammad Rezal |
author_sort |
Nek Abdul Rahman, Normahirah |
title |
The development of deniable authentication protocol based on the bivariate function hard problem |
title_short |
The development of deniable authentication protocol based on the bivariate function hard problem |
title_full |
The development of deniable authentication protocol based on the bivariate function hard problem |
title_fullStr |
The development of deniable authentication protocol based on the bivariate function hard problem |
title_full_unstemmed |
The development of deniable authentication protocol based on the bivariate function hard problem |
title_sort |
development of deniable authentication protocol based on the bivariate function hard problem |
publisher |
Femto Technique |
publishDate |
2016 |
url |
http://psasir.upm.edu.my/id/eprint/3638/1/The%20development%20of%20deniable%20authentication%20protocol%20based%20on%20the%20bivariate%20function%20hard%20problem.pdf http://psasir.upm.edu.my/id/eprint/3638/ http://ijns.jalaxy.com.tw/contents/ijns-v18-n1/ijns-v18-n1.html |
_version_ |
1643822668700450816 |
score |
13.211869 |