1. Fully Deniable Message Authentication Protocols Preserving Confidentiality.
- Author
-
Harn, Lein, Lee, Chia-Yin, Lin, Changlu, and Chang, Chin-Chen
- Subjects
- *
COMPUTER network security , *MESSAGE theory (Communication) , *COMPUTER network protocols , *CONFIDENTIAL communications , *CRYPTOGRAPHY , *COMPUTER security - Abstract
Although the objective of secure communication can be achieved by using cryptographic tools, the undeniability that results from cryptographic properties may create a potential threat to the sender of the message. Unfortunately, most existing deniable protocols only provide 1-out-of-2 deniability. When both parties (the sender and the receiver) are allowed to deny generating the message, a dispute might occur between these two parties. The 1-out-of-2 deniable protocol can result in an unfair resolution of the dispute. Therefore, we propose a new model of deniability, called 1-out-of-∞ deniability, that can provide full deniability. The 1-out-of-∞ deniability protocol allows the originator of the message to deny that he or she generated the message, since there are an infinite number of possible message generators; at the same time, all transmitted messages can be protected and authenticated between the sender and the intended receiver. Our design can be implemented by using any public-key cryptography technique. We also analyze the correctness of the proposed protocols based on logical rules, and two practical examples are given to illustrate our design. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF