Title: An efficient certificateless deniable authentication protocol without pairings
Authors: Chunhua Jin; Chunxiang Xu; Xiaojun Zhang; Fagen Li
Addresses: School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China ' School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China ' School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China ' School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China
Abstract: A deniable authentication protocol enables an intended receiver to identify the source of a given message, but the receiver cannot prove the source of a given message to any third party. It is very useful in some particular applications such as electronic voting, online negotiation and online shopping. However, many related protocols are lack of formal security proof which is very important for cryptographic protocol design. In this paper, we present a certificateless deniable authentication protocol. Our protocol is based on certificateless cryptography, which can solve the public key certificate management problem of public key infrastructure (PKI)-based cryptography and the key escrow problem of identity-based cryptography. Our protocol does not need the pairing operation which is the most time-consuming. In addition, our protocol can admit formal security proof in the random oracle model and resist key compromise impersonation (KCI) attack. Compared with the existing deniable authentication protocols, our protocol can be well applied in electronic voting system.
Keywords: deniable authentication; certificateless cryptography; pairings; random oracle model; electronic security; digital forensics; public key certificate management; public key infrastructure; PKI-based cryptography; key escrow; identity-based cryptography; electronic voting; e-voting; e-democracy; electronic democracy; key compromise impersonation; KCI attacks.
DOI: 10.1504/IJESDF.2015.069611
International Journal of Electronic Security and Digital Forensics, 2015 Vol.7 No.2, pp.179 - 196
Received: 04 Feb 2015
Accepted: 30 Mar 2015
Published online: 28 May 2015 *