Browse > Article
http://dx.doi.org/10.3837/tiis.2015.05.020

An Efficient Identity-Based Deniable Authenticated Encryption Scheme  

Wu, Weifeng (School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu)
Li, Fagen (School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.9, no.5, 2015 , pp. 1904-1919 More about this Journal
Abstract
Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.
Keywords
Bilinear pairings; Deniable authentication; ID-based cryptography; Random oracle model;
Citations & Related Records
연도 인용수 순위
  • Reference