This paper describes a secure identity based deniable authentication protocol whose security is based on difficulty of breaking Diffie-Hellman Problem on Elliptic Curve (ECDHP) and hash function. Elliptic curve cryptosystem (ECC) has significant advantages like smaller key sizes, faster computations compared with other public-key cryptography. Since it is an ECC based authentication protocol, it can be implimented in mobile devices such as smart card, PDA etc. Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.
CITATION STYLE
Kar, J. (2012). ID-based deniable authentication protocol suitable for mobile devices. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (Vol. 94 LNICST, pp. 160–171). https://doi.org/10.1007/978-3-642-30244-2_14
Mendeley helps you to discover research relevant for your work.