scispace - formally typeset
Open AccessJournal Article

Authentication, enhanced security and error correcting codes

Yonatan Aumann, +1 more
- 01 Jan 1998 - 
- pp 299-303
TLDR
The first Deniable Authentication method is provably valid for any encryption scheme with minimal security properties, i.e. this method is generic, and the second method is Provably valid under the usual assumption that factorization is intractable.
Abstract
In electronic communications and in access to systems, the issue of authentication of the Sender S of a message M, as well as of the message itself, is of paramount importance. Recently S. Goldwasser has raised the additional issue of Deniable Authentication where the sender S authenticates the message M to the Receiver's (R) satisfaction, but can later deny his authorship of M even to an Inquisitor INQ who has listened to the exchange between S and R and who gains access to all of the the secret information used by S and R. We present two practical schemes for Deniable Authentication of messages M of arbitrary length n. In both schemes the Receiver R is assured with probability greater than 1 - 2 -k , where k is a chosen security parameter, that M originated with the Sender S. Deniability is absolute in the information theoretic sense. The first scheme requires 2.4kn XOR operations on bits and one public key encoding and decoding of a short message. The second scheme requires the same number of XOR operations and k multiplications mod N, where N is some fixed product of two large primes. A key new feature of our method is the use of a Shannon-style error correction code. Traditional authentication for a long message M starts by hashing M down to a standard word-size. We expand M through error correction. The first Deniable Authentication method is provably valid for any encryption scheme with minimal security properties, i.e. this method is generic. The second Deniable Authentication method is provably valid under the usual assumption that factorization is intractable.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

Protocols for Authentication and Key Establishment

Colin Boyd, +1 more
TL;DR: This is the first comprehensive and integrated treatment of protocols for authentication and key establishment, which allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.
Journal ArticleDOI

Deniable authentication protocol based on Deffie-Hellman algorithm

TL;DR: A deniable authentication protocol, which is based on the Deffie-Hellman key exchange protocol, is presented, and it does not require a trusted third party, and the protocol can resist person-in-the-middle attack.
Journal ArticleDOI

Efficient deniable authentication protocol based on generalized ElGamal signature scheme

TL;DR: An efficient and non-interactive deniable authentication protocol is presented to enable a receiver to identify the source of a given message, but not prove the identity of the sender to a third party.
Journal ArticleDOI

New Approaches for Deniable Authentication

TL;DR: In this article, the authors present two new approaches to the problem of deniable authentication, which do not require the use of CCA-secure encryption (all previous known solutions did).
Journal ArticleDOI

Fingerprint Biometric-based Self-Authentication and Deniable Authentication Schemes for the Electronic World

TL;DR: Security analysis shows that the proposed two-factor-based self-authentication and deniable authentication schemes can overcome the security pitfalls of the previous schemes and are secure, reliable and practicable with high potential to be used in the electronic world.