• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

Vol. 9, No. 5, May 30, 2015
10.3837/tiis.2015.05.020, Download Paper (Free):

Abstract

Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn。ッt achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear DiffieHellman (BDH) assumption.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
W. Wu and F. Li, "An Efficient Identity-Based Deniable Authenticated Encryption Scheme," KSII Transactions on Internet and Information Systems, vol. 9, no. 5, pp. 1904-1919, 2015. DOI: 10.3837/tiis.2015.05.020.

[ACM Style]
Weifeng Wu and Fagen Li. 2015. An Efficient Identity-Based Deniable Authenticated Encryption Scheme. KSII Transactions on Internet and Information Systems, 9, 5, (2015), 1904-1919. DOI: 10.3837/tiis.2015.05.020.

[BibTeX Style]
@article{tiis:20800, title="An Efficient Identity-Based Deniable Authenticated Encryption Scheme", author="Weifeng Wu and Fagen Li and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2015.05.020}, volume={9}, number={5}, year="2015", month={May}, pages={1904-1919}}