Home > Papers

 
 
Deniable Message Transmission Authenticator Based on Weak Signature Schemes
TianHaibo *
School of Information Science and Technology,SunYat-Sen University, GuangZhou 510275
*Correspondence author
#Submitted by
Subject:
Funding: Specialized Research Fund for the Doctoral Program of Higher Education for New Teachers (No.No. 20090171120006)
Opened online:17 April 2012
Accepted by: none
Citation: TianHaibo.Deniable Message Transmission Authenticator Based on Weak Signature Schemes[OL]. [17 April 2012] http://en.paper.edu.cn/en_releasepaper/content/4474877
 
 
This paper shows how to use signature schemes for deniableauthentication. Deniable authentication means that a messagereceiver R, although received a message m from a sender S,cannot convince a third party that the sender S has sent R themessage m. Obviously, signature schemes secure againstexistential forgery are unsuitable for such a deniabilityproperty. However, if signature schemes are just secure againstselective forgery, we can construct a deniable authenticationprotocol. The protocol is presented in the extension framework ofRaimondo et al. as a deniable message transmission (MT)authenticator.
Keywords:Authentication; Digital Signatures; Privacy-Enhancing Technologies
 
 
 

For this paper

  • PDF (0B)
  • ● Revision 0   
  • ● Print this paper
  • ● Recommend this paper to a friend
  • ● Add to my favorite list

    Saved Papers

    Please enter a name for this paper to be shown in your personalized Saved Papers list

Tags

Add yours

Related Papers

Statistics

PDF Downloaded 237
Bookmarked 0
Recommend 5
Comments Array
Submit your papers