Non-interactive deniable authentication protocols

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper gives a security model for non-interactive deniable authentication (NIDA) protocols. This model captures a session-state-reveal attack and a key-compromise-impersonation attack. We analyze some NIDA protocols in the model, and we find that no one is satisfactory. We give a new paradigm to construct an NIDA protocol, which is provably secure in the model. © 2012 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Tian, H., Chen, X., & Jiang, Z. (2012). Non-interactive deniable authentication protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7537 LNCS, pp. 142–159). Springer Verlag. https://doi.org/10.1007/978-3-642-34704-7_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free