New Approaches for Deniable Authentication
Deniable Authentication protocols allow a Sender to authenticate a message for a Receiver, in a way that the Receiver cannot convince a third party that such authentication (or any authentication) ever took place. We present two new approaches to the problem of deniable authentication. The novelty o...
Gespeichert in:
Veröffentlicht in: | Journal of cryptology 2009-10, Vol.22 (4), p.572-615 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Deniable Authentication protocols allow a Sender to authenticate a message for a Receiver, in a way that the Receiver cannot convince a third party that such authentication (or any authentication) ever took place.
We present two new approaches to the problem of deniable authentication. The novelty of our schemes is that they do not require the use of CCA-secure encryption (all previous known solutions did), thus showing a different generic approach to the problem of deniable authentication. These new approaches are practically relevant as they lead to more efficient protocols.
In the process we point out a subtle definitional issue for deniability. In particular, we propose the notion of
forward deniability
, which requires that the authentications remain deniable even if the
Sender
wants to later prove that she authenticated a message. We show that a simulation-based definition of deniability, where the simulation can be
computationally indistinguishable
from the real protocol does
not
imply forward deniability. Thus, for deniability one needs to restrict the simulation to be perfect (or statistically close). Our new protocols satisfy this stricter requirement. |
---|---|
ISSN: | 0933-2790 1432-1378 |
DOI: | 10.1007/s00145-009-9044-3 |