2009
DOI: 10.1007/978-3-642-00457-5_10
|View full text |Cite
|
Sign up to set email alerts
|

Composability and On-Line Deniability of Authentication

Abstract: Abstract. Protocols for deniable authentication achieve seemingly paradoxical guarantees: upon completion of the protocol the receiver is convinced that the sender authenticated the message, but neither party can convince anyone else that the other party took part in the protocol. We introduce and study on-line deniability, where deniability should hold even when one of the parties colludes with a third party during execution of the protocol. This turns out to generalize several realistic scenarios that are ou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
52
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(52 citation statements)
references
References 34 publications
0
52
0
Order By: Relevance
“…Implicit DAKE schemes, such as those from Cremers and Feltz [CF11], from Yao and Zhao [YZ13], and 3-DH [Ope13d], all lack online repudiation because they include non-repudiable (and thus non-simulatable) signatures. The scheme introduced as Φ dre by Walfish in his Ph.D. thesis [Wal08], and later reiterated in a publication by Dodis et al [DKSW09], does satisfy all of our requirements for a DAKE; we discuss this protocol in greater depth in Section 3.6.…”
Section: Deniable Authenticated Key Exchangesmentioning
confidence: 99%
“…Implicit DAKE schemes, such as those from Cremers and Feltz [CF11], from Yao and Zhao [YZ13], and 3-DH [Ope13d], all lack online repudiation because they include non-repudiable (and thus non-simulatable) signatures. The scheme introduced as Φ dre by Walfish in his Ph.D. thesis [Wal08], and later reiterated in a publication by Dodis et al [DKSW09], does satisfy all of our requirements for a DAKE; we discuss this protocol in greater depth in Section 3.6.…”
Section: Deniable Authenticated Key Exchangesmentioning
confidence: 99%
“…Ideally, the advantage should be small for any efficient D and A and where the simulator's efficiency characteristics are close to the one of the adversary. We note that there are even stronger versions, called online deniability [DKSW09] where the distinguisher can communicate with the malicious party resp. the simulator while the protocol is executed.…”
Section: Defining Deniabilitymentioning
confidence: 99%
“…A recent paper [2] gives a detailed evaluation of the energy costs of interactive and non-interactive key exchange protocols in the ID-based and PKI settings for wireless communications with a jamming adversary, demonstrating that significant energy savings can be made by adopting a non-interactive approach to key establishment. Its non-interactive nature makes NIKE an abstract building block that is qualitatively different from interactive key exchange: e.g., to achieve deniable authentication, [3] explicitly requires a non-interactive key exchange. But NIKE can also be used as a basis for interactive key exhange [4,5,6]: for example, in [5], the authors use the shared key in a MAC to authenticate an exchange of ephemeral Diffie-Hellman values.…”
Section: Introductionmentioning
confidence: 99%
“…The model for NIKE in [10] is similar to, and presumably inspired by, the early work of Shoup [16] on interactive key exchange, where capturing so-called PKI attacks, also known as rogue-key attacks, was intrinsic to the security modelling. This modelling approach is referred to elsewhere in the literature as the plain setting (see [20,21] and the references therein) or the bare PKI setting [3]. The CKS model is certainly more challenging than settings where proofs of knowledge or proofs of possession of private keys are assumed to be given during registration, or where the adversary must reveal its secret key directly (as with the knowledge of secret key assumption used in [22,23]).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation