Check out RSS, or use RSS reader to subscribe this item
Confirmation
Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
Sponsored by the Center for Science and Technology Development of the Ministry of Education
Supervised by Ministry of Education of the People's Republic of China
This paper shows how to use signature schemes for deniableauthentication. Deniable authentication means that a messagereceiver R, although received a message m from a sender S,cannot convince a third party that the sender S has sent R themessage m. Obviously, signature schemes secure againstexistential forgery are unsuitable for such a deniabilityproperty. However, if signature schemes are just secure againstselective forgery, we can construct a deniable authenticationprotocol. The protocol is presented in the extension framework ofRaimondo et al. as a deniable message transmission (MT)authenticator.
Keywords:Authentication; Digital Signatures; Privacy-Enhancing Technologies