A deniable authentication protocol should satisfy the property that only the intended receiver authenticates the sender's identity of received messages. On the other hand, the receiver cannot prove the sender's identity to the third party. Although the sent message is deniable for the sender, the sender still has no evidence to prove that he/she sent the message to prevent the receiver's implication. Therefore, a deniable authentication protocol with sender protection is first proposed. Keywords: Non-interactive, deniable authentication protocols, concurrent signatures, authentication
Relation:
2007 NCS 中華民國九十六年全國計算機會議大會論文集=Proceedings of 2007 National Computer Symposium,6頁