A deniable authentication protocol is used to identify the source of a received message for a receiver, but the receiver is unable to prove to a third party the source of the received message. Recently, Fan et al. proposed a deniable authentication protocol based on Diffie-Hellman algorithm. In this paper, we show that Fan et al.'s protocol does not possess the deniable property as they claimed. A cheating receiver can prove the source of the received message to a third party. In addition, we also present a modification of Fan et al.'s protocol to overcome the security flaw.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Bin-Tsan HSIEH, Hung-Min SUN, "An Improvement of a Deniable Authentication Protocol" in IEICE TRANSACTIONS on Communications,
vol. E87-B, no. 10, pp. 3099-3101, October 2004, doi: .
Abstract: A deniable authentication protocol is used to identify the source of a received message for a receiver, but the receiver is unable to prove to a third party the source of the received message. Recently, Fan et al. proposed a deniable authentication protocol based on Diffie-Hellman algorithm. In this paper, we show that Fan et al.'s protocol does not possess the deniable property as they claimed. A cheating receiver can prove the source of the received message to a third party. In addition, we also present a modification of Fan et al.'s protocol to overcome the security flaw.
URL: https://global.ieice.org/en_transactions/communications/10.1587/e87-b_10_3099/_p
Copy
@ARTICLE{e87-b_10_3099,
author={Bin-Tsan HSIEH, Hung-Min SUN, },
journal={IEICE TRANSACTIONS on Communications},
title={An Improvement of a Deniable Authentication Protocol},
year={2004},
volume={E87-B},
number={10},
pages={3099-3101},
abstract={A deniable authentication protocol is used to identify the source of a received message for a receiver, but the receiver is unable to prove to a third party the source of the received message. Recently, Fan et al. proposed a deniable authentication protocol based on Diffie-Hellman algorithm. In this paper, we show that Fan et al.'s protocol does not possess the deniable property as they claimed. A cheating receiver can prove the source of the received message to a third party. In addition, we also present a modification of Fan et al.'s protocol to overcome the security flaw.},
keywords={},
doi={},
ISSN={},
month={October},}
Copy
TY - JOUR
TI - An Improvement of a Deniable Authentication Protocol
T2 - IEICE TRANSACTIONS on Communications
SP - 3099
EP - 3101
AU - Bin-Tsan HSIEH
AU - Hung-Min SUN
PY - 2004
DO -
JO - IEICE TRANSACTIONS on Communications
SN -
VL - E87-B
IS - 10
JA - IEICE TRANSACTIONS on Communications
Y1 - October 2004
AB - A deniable authentication protocol is used to identify the source of a received message for a receiver, but the receiver is unable to prove to a third party the source of the received message. Recently, Fan et al. proposed a deniable authentication protocol based on Diffie-Hellman algorithm. In this paper, we show that Fan et al.'s protocol does not possess the deniable property as they claimed. A cheating receiver can prove the source of the received message to a third party. In addition, we also present a modification of Fan et al.'s protocol to overcome the security flaw.
ER -