This paper gives a security model for non-interactive deniable authentication (NIDA) protocols. This model captures a session-state-reveal attack and a key-compromise-impersonation attack. We analyze some NIDA protocols in the model, and we find that no one is satisfactory. We give a new paradigm to construct an NIDA protocol, which is provably secure in the model. © 2012 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Tian, H., Chen, X., & Jiang, Z. (2012). Non-interactive deniable authentication protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7537 LNCS, pp. 142–159). Springer Verlag. https://doi.org/10.1007/978-3-642-34704-7_12
Mendeley helps you to discover research relevant for your work.