Premium
A simple protocol for deniable authentication based on ElGamal cryptography
Author(s) -
Wang Yingjie,
Li Jianhua,
Tie Ling
Publication year - 2005
Publication title -
networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.977
H-Index - 64
eISSN - 1097-0037
pISSN - 0028-3045
DOI - 10.1002/net.20062
Subject(s) - elgamal encryption , computer science , authentication (law) , authentication protocol , protocol (science) , simple (philosophy) , cryptography , elgamal signature scheme , computer security , elliptic curve cryptography , computer network , public key cryptography , encryption , blind signature , medicine , philosophy , alternative medicine , epistemology , pathology
Deniable authentication is different from traditional authentication in that the receiver cannot prove the source of a given message to a third party. This article presents a new deniable authentication protocol, based on ElGamal cryptography. The protocol meets the two properties of deniable authentication and can withstand person‐in‐middle (PIM) attacks. Compared with previous schemes, it is simpler and more efficient. © 2005 Wiley Periodicals, Inc. NETWORKS, Vol. 45(4), 193–194 2005