搜索结果: 1-6 共查到“军事学 deniable authentication protocol”相关记录6条 . 查询时间(0.078 秒)
A novel certificateless deniable authentication protocol
Deniable authentication Certificateless
2014/3/12
Deniable authenticated protocol is a new and attractive protocol compared to the traditional authentication protocol. It allows the appointed receiver to identify the source of a given message, but no...
A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem
deniability deniable authentication protocol Fiat-Shamir heuristic perfect zero-knowledge simulatability
2010/11/2
Recently, many non-interactive deniable authentication (NIDA) protocols have been proposed. They are mainly composed of two types, signature-based and shared-secrecy based. After reviewing these schem...
A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm
deniable authentication ECDLP ECDHP HDDH Bilinear pairing
2010/7/14
This paper describes a new deniable authentication protocol whose security is based Diffe-Hellman (CDH) Problem of type Decisional Diffie-Hellman(DDH) and the Hash Diffie-Hellman (HDDH) problem.This p...
A ID-Based Deniable Authentication Protocol on pairings
Deniable Authentication bilinear pairings
2008/12/19
Recently, Yoon et al. and Cao et al. propose two deniable authentication protocols
respectively. They both claim that their protocols can achieve the deniable property.
However, in this paper, we wi...
An Enhanced ID-based Deniable Authentication Protocol on Pairings
ID-based Authentication Protocol Pairings
2008/9/5
Deniability is defined as a privacy property which enables protocol
principals to deny their involvement after they had taken part in a particular
protocol run. Lately, Chou et al. had proposed the...
Cryptanalysis on Improved Chou et al.’s ID-Based Deniable Authentication Protocol
Cryptanalysis Improved Chou et al.’s ID-Based Deniable Authentication Protocol
2008/5/26
A deniable authentication protocol enables the protocol
participants to authenticate their respective peers, while
able to deny their participation after the protocol execution.
This protocol can b...