搜索结果: 1-13 共查到“军事学 Deniable authentication”相关记录13条 . 查询时间(0.093 秒)
ECC-Based Non-Interactive Deniable Authentication with Designated Verifier
Designated Verifier Non-Interactive
2014/3/5
Recently, researchers have proposed many non-interactive deniable authentication (NIDA) protocols. Most of them claim that their protocols possess full deniability. However, after reviewing, we found ...
A novel certificateless deniable authentication protocol
Deniable authentication Certificateless
2014/3/12
Deniable authenticated protocol is a new and attractive protocol compared to the traditional authentication protocol. It allows the appointed receiver to identify the source of a given message, but no...
A non-interactive deniable authentication scheme in the standard model
public-key cryptography
2012/6/14
Deniable authentication protocols enable a sender to authenticate a message to a receiver such that the receiver is unable to prove the identity of the sender to a third party. In contrast to interact...
A non-interactive deniable authentication scheme in the standard model
public-key cryptography
2012/3/20
Deniable authentication protocols enable a sender to authenticate a message to a receiver such that the receiver is unable to prove the identity of the sender to a third party. In contrast to interact...
A non-interactive deniable authentication scheme in the standard model
public-key cryptography
2012/8/28
Deniable authentication protocols enable a sender to authenticate a message to a receiver such that the receiver is unable to prove the identity of the sender to a third party. In contrast to interact...
A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem
deniability deniable authentication protocol Fiat-Shamir heuristic perfect zero-knowledge simulatability
2010/11/2
Recently, many non-interactive deniable authentication (NIDA) protocols have been proposed. They are mainly composed of two types, signature-based and shared-secrecy based. After reviewing these schem...
A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm
deniable authentication ECDLP ECDHP HDDH Bilinear pairing
2010/7/14
This paper describes a new deniable authentication protocol whose security is based Diffe-Hellman (CDH) Problem of type Decisional Diffie-Hellman(DDH) and the Hash Diffie-Hellman (HDDH) problem.This p...
A non-interactive deniable authentication scheme based on designated verifier proofs
Deniable authentication Authentication Designated verifier proofs
2009/6/3
A deniable authentication protocol enables a receiver to identify the source of the
given messages but unable to prove to a third party the identity of the sender. In recent years,
several non-inter...
Deniable Authentication with RSA and Multicasting
Deniable Authentication RSA Multicasting
2009/1/16
A deniable authentication scheme using RSA is described and proven secure in the
random oracle model. A countermeasure to a well-known attack on ecient deniable
authentication to multiple recipient...
Deniable Authentication protocols allow a Sender to authenticate a message for a Receiver,
in a way that the Receiver cannot convince a third party that such authentication (or any
authentication) e...
A ID-Based Deniable Authentication Protocol on pairings
Deniable Authentication bilinear pairings
2008/12/19
Recently, Yoon et al. and Cao et al. propose two deniable authentication protocols
respectively. They both claim that their protocols can achieve the deniable property.
However, in this paper, we wi...
An Enhanced ID-based Deniable Authentication Protocol on Pairings
ID-based Authentication Protocol Pairings
2008/9/5
Deniability is defined as a privacy property which enables protocol
principals to deny their involvement after they had taken part in a particular
protocol run. Lately, Chou et al. had proposed the...
Cryptanalysis on Improved Chou et al.’s ID-Based Deniable Authentication Protocol
Cryptanalysis Improved Chou et al.’s ID-Based Deniable Authentication Protocol
2008/5/26
A deniable authentication protocol enables the protocol
participants to authenticate their respective peers, while
able to deny their participation after the protocol execution.
This protocol can b...