An efficient identity-based deniable authenticated encryption scheme

13Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn’t achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.

Cite

CITATION STYLE

APA

Wu, W., & Li, F. (2015). An efficient identity-based deniable authenticated encryption scheme. KSII Transactions on Internet and Information Systems, 9(5), 1904–1919. https://doi.org/10.3837/tiis.2015.05.020

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free