A secure non-interactive deniable authentication protocol with certificates based on elliptic curve cryptography

6Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Since the information technology continues to grow and the network applications are getting popular, protecting the privacy of Internet users on the open network becomes a necessary concern. The traditional authentication protocol is not suitable for the requirements of internet security nowadays. That is, it cannot assure that the private information not be revealed during the authentication operation, or be used by malicious terminal service managers for their personal gain in some other business opportunities. Hence, in the dissertation, we propose a deniable authentication protocol based on elliptic curve cryptography (ECC) to satisfy the current public key infrastructure and fulfill the following security requirements of deniable authentication protocols. 1. Each user can prove his/her legitimacy to the designated verifier. 2. The designated verifier cannot prove the identity of the user to the third party even though the verifier provides the testimonials. Moreover, the proposed deniable authentication protocol is suitable for the mobile devices since it only needs limited computation resources.

Cite

CITATION STYLE

APA

Chuang, Y. H., Hsu, C. L., Shu, W., Hsu, K. C., & Liao, M. W. (2015). A secure non-interactive deniable authentication protocol with certificates based on elliptic curve cryptography. Studies in Computational Intelligence, 598, 183–190. https://doi.org/10.1007/978-3-319-16211-9_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free