Title: An efficient certificateless deniable authentication protocol without pairings

Authors: Chunhua Jin; Chunxiang Xu; Xiaojun Zhang; Fagen Li

Addresses: School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China ' School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China ' School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China ' School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China

Abstract: A deniable authentication protocol enables an intended receiver to identify the source of a given message, but the receiver cannot prove the source of a given message to any third party. It is very useful in some particular applications such as electronic voting, online negotiation and online shopping. However, many related protocols are lack of formal security proof which is very important for cryptographic protocol design. In this paper, we present a certificateless deniable authentication protocol. Our protocol is based on certificateless cryptography, which can solve the public key certificate management problem of public key infrastructure (PKI)-based cryptography and the key escrow problem of identity-based cryptography. Our protocol does not need the pairing operation which is the most time-consuming. In addition, our protocol can admit formal security proof in the random oracle model and resist key compromise impersonation (KCI) attack. Compared with the existing deniable authentication protocols, our protocol can be well applied in electronic voting system.

Keywords: deniable authentication; certificateless cryptography; pairings; random oracle model; electronic security; digital forensics; public key certificate management; public key infrastructure; PKI-based cryptography; key escrow; identity-based cryptography; electronic voting; e-voting; e-democracy; electronic democracy; key compromise impersonation; KCI attacks.

DOI: 10.1504/IJESDF.2015.069611

International Journal of Electronic Security and Digital Forensics, 2015 Vol.7 No.2, pp.179 - 196

Received: 04 Feb 2015
Accepted: 30 Mar 2015

Published online: 27 May 2015 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article