Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (6): 71-81.doi: 10.11959/j.issn.2096-109x.2016.00059

• academic paper • Previous Articles    

Deniable authentication for multi-party protocol

Yong CHEN(),Long LU,Sheng-ke ZENG,Ming-xing HE   

  1. School of Computer and Software Engineering,Xihua University,Chengdu 610039,China
  • Revised:2015-05-25 Online:2016-06-15 Published:2020-03-26
  • Supported by:
    The National Natural Science Foundation of China(61402376);The National Natural Science Foundation of China(U1433130);The Open Research Foundation of Key Laboratory of Colleges and Universities in Sichuan Province(SZJJ2014-078);National Science and Technology Support Program(2011BAH26B04);Chunhui Project of the Ministry of Education of China(Z2014045)

Abstract:

Deniable authentication can authenticate messages like digital signatures,and its non-public verification can meet many requirements that cannot be met by signatures,such as privacy preservation.How to achieve deni-able authentication with multi-party protocol was the study aim.A deniable authentication for multi-party protocol using string commitment scheme was proposed.As a generic method,it can pass the most of protocol to deniable protocol,such as the deniable group key agreement protocol.The adversarial model was formalized and the security was proved strictly.The research content provide a new idea for studying deniable authentication.

Key words: deniable authentication, multi-party protocol, commitment, security

CLC Number: 

No Suggested Reading articles found!