The development of deniable authentication protocol based on the bivariate function hard problem

A deniable authentication protocol enables a receiver to identify the true source of a given message but not to prove the identity of the sender to the third party. Non-interactive protocol is more efficient than interactive protocol in terms of communication overhead, and thus several non-interacti...

Full description

Saved in:
Bibliographic Details
Main Authors: Nek Abdul Rahman, Normahirah, Kamel Ariffin, Muhammad Rezal
Format: Article
Language:English
Published: Femto Technique 2016
Online Access:http://psasir.upm.edu.my/id/eprint/3638/1/The%20development%20of%20deniable%20authentication%20protocol%20based%20on%20the%20bivariate%20function%20hard%20problem.pdf
http://psasir.upm.edu.my/id/eprint/3638/
http://ijns.jalaxy.com.tw/contents/ijns-v18-n1/ijns-v18-n1.html
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.upm.eprints.3638
record_format eprints
spelling my.upm.eprints.36382016-06-20T05:40:23Z http://psasir.upm.edu.my/id/eprint/3638/ The development of deniable authentication protocol based on the bivariate function hard problem Nek Abdul Rahman, Normahirah Kamel Ariffin, Muhammad Rezal A deniable authentication protocol enables a receiver to identify the true source of a given message but not to prove the identity of the sender to the third party. Non-interactive protocol is more efficient than interactive protocol in terms of communication overhead, and thus several non-interactive deniable authentication protocols have been proposed. So, it is very necessary to design a deniable authentication protocol which is non-interactive, secure and efficient. This paper proposes a deniable authentication protocol based on the bivariate function hard problem (BFHP) cryptographic primitive. An improvement based on the BFHP is suggested since the problem of the BFHP provides the needed security elements plus its fast execution time. At the same time, the proposed protocol has properties of completeness, deniability, security of forgery attack, security of impersonation attack and security man-in-the-middle attack also has been proved. Femto Technique 2016 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/3638/1/The%20development%20of%20deniable%20authentication%20protocol%20based%20on%20the%20bivariate%20function%20hard%20problem.pdf Nek Abdul Rahman, Normahirah and Kamel Ariffin, Muhammad Rezal (2016) The development of deniable authentication protocol based on the bivariate function hard problem. International Journal of Network Security, 18 (1). pp. 151-157. ISSN 1816-353X; ESSN: 1816-3548 http://ijns.jalaxy.com.tw/contents/ijns-v18-n1/ijns-v18-n1.html
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
language English
description A deniable authentication protocol enables a receiver to identify the true source of a given message but not to prove the identity of the sender to the third party. Non-interactive protocol is more efficient than interactive protocol in terms of communication overhead, and thus several non-interactive deniable authentication protocols have been proposed. So, it is very necessary to design a deniable authentication protocol which is non-interactive, secure and efficient. This paper proposes a deniable authentication protocol based on the bivariate function hard problem (BFHP) cryptographic primitive. An improvement based on the BFHP is suggested since the problem of the BFHP provides the needed security elements plus its fast execution time. At the same time, the proposed protocol has properties of completeness, deniability, security of forgery attack, security of impersonation attack and security man-in-the-middle attack also has been proved.
format Article
author Nek Abdul Rahman, Normahirah
Kamel Ariffin, Muhammad Rezal
spellingShingle Nek Abdul Rahman, Normahirah
Kamel Ariffin, Muhammad Rezal
The development of deniable authentication protocol based on the bivariate function hard problem
author_facet Nek Abdul Rahman, Normahirah
Kamel Ariffin, Muhammad Rezal
author_sort Nek Abdul Rahman, Normahirah
title The development of deniable authentication protocol based on the bivariate function hard problem
title_short The development of deniable authentication protocol based on the bivariate function hard problem
title_full The development of deniable authentication protocol based on the bivariate function hard problem
title_fullStr The development of deniable authentication protocol based on the bivariate function hard problem
title_full_unstemmed The development of deniable authentication protocol based on the bivariate function hard problem
title_sort development of deniable authentication protocol based on the bivariate function hard problem
publisher Femto Technique
publishDate 2016
url http://psasir.upm.edu.my/id/eprint/3638/1/The%20development%20of%20deniable%20authentication%20protocol%20based%20on%20the%20bivariate%20function%20hard%20problem.pdf
http://psasir.upm.edu.my/id/eprint/3638/
http://ijns.jalaxy.com.tw/contents/ijns-v18-n1/ijns-v18-n1.html
_version_ 1643822668700450816
score 13.211869