Abstract

A deniable authentication protocol enables a receiver to identify the source of a given message, but not to prove the identity of the sender to any third party. This can be very useful in e-government or e-commerce, such as in e-voting or online negotiation. The notion of “non-interactive” was first proposed by Z. Shao[1], after that, many non-interactive deniable authentication protocols were proposed. Non-interactive protocols are more efficient than interactive protocols because the information transmitted is much less. The proposed protocol is based on generalized ElGamal signature scheme, it can be and only can be authenticated by the intended receiver, and it is deniable. Moreover, it can withstand forgery and impersonate attacks.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call