An improved deniable authentication protocol

  • Jun Shao
  • , Zhenfu Cao*
  • , Rongxing Lu
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

12 Scopus citations

Abstract

Deniable authentication, which was introduced to realize secure online negotiation, has been an extensive topic of research. Wang et al. proposed an efficient deniable authentication protocol based on EIGamal cryptography. However, in this article, we show that Wang et al.'s protocol (WLT protocol) is vulnerable to the person-in-the-middle (PIM) attack. An adversary who launches a PIM attack can impersonate a valid user to communicate with the verifier, which will eventually lead to the failure of an online negotiation. To mitigate this security breach, we propose an improved deniable authentication protocol based on Wang et al.'s scheme. Further, a detailed security analysis is conducted to verify the proposed scheme.

Original languageEnglish
Pages (from-to)179-181
Number of pages3
JournalNetworks
Volume48
Issue number4
DOIs
StatePublished - 2006
Externally publishedYes

Keywords

  • Deniable authentication
  • Elgamal cryptography
  • Forgery attack
  • Impersonate attack
  • PIM attack

Fingerprint

Dive into the research topics of 'An improved deniable authentication protocol'. Together they form a unique fingerprint.

Cite this