%0 Journal Article %T Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme %A Chi-Yu Liu %A Cheng-Chi Lee %A Tzu-Chun Lin %J International Journal of Network Security %D 2011 %I Femto Technique %X In 1998, Dwork et al. first proposed an application of zero-knowledge, deniable authentication protocol.Thereafter, there were many researches about the deniable authentication schemes. In 2004, Shaodemonstrated out that the previous schemes had a common weakness in which any third party canimpersonate the intended receiver to verify the signature of the given message, and theyproposed a new scheme based on ElGamal signature scheme. Although Shao claimed that hisscheme could provide complete security and properties of a deniable authentication scheme,we will point out that Shao's scheme is unable to achieve the second requirement of thedeniable authentication scheme. %K Deniable authentication %K E-cash %K Impersonation attack %K Security %U http://ijns.femto.com.tw/download_paper.jsp?PaperID=IJNS-2010-01-12-1&PaperName=ijns-v12-n1/ijns-2011-v12-n1-p58-60.pdf