全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme

Keywords: Deniable authentication , E-cash , Impersonation attack , Security

Full-Text   Cite this paper   Add to My Lib

Abstract:

In 1998, Dwork et al. first proposed an application of zero-knowledge, deniable authentication protocol.Thereafter, there were many researches about the deniable authentication schemes. In 2004, Shaodemonstrated out that the previous schemes had a common weakness in which any third party canimpersonate the intended receiver to verify the signature of the given message, and theyproposed a new scheme based on ElGamal signature scheme. Although Shao claimed that hisscheme could provide complete security and properties of a deniable authentication scheme,we will point out that Shao's scheme is unable to achieve the second requirement of thedeniable authentication scheme.

Full-Text

Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133