17-12-2025
جامعة الملك عبدالعزيز
KING ABDULAZIZ UNIVERSITY
Faculty of Computing and Information Technology
Document Details
Document Type
:
Article In Conference
Document Title
:
ID-based Deniable Authentication Protocol Suitable for Mobile devices
نظام هوية يعتمد على بروتوكول مصادقة قابل للإنكار يناسب الأجهزة المتنقلة
Subject
:
Cryptographic Protocols
Document Language
:
English
Abstract
:
This paper describes a secure identity based deniable authentication protocol whose security is based on difficulty of breaking Diffe-Hellman Problem on Elliptic Curve (ECDHP) and hash function. Elliptic curve cryptosystem (ECC) has significant advantages like smaller key sizes, faster computations compared with other public-key cryptography. Since it is an ECC based authentication protocol, it can be implemented in mobile devices such as smart card, PDA etc. Deniable authentication protocol enables a receiver to identify the true source of a given message, But not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet.
Conference Name
:
3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec 2011), Aalborg, Denmark.
Duration
:
From : 1432 AH - To : 1432 AH
From : 2011 AD - To : 2011 AD
Publishing Year
:
1432 AH
2011 AD
Number Of Pages
:
12
Article Type
:
Article
Conference Place
:
Denmark
Organizing Body
:
3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems
Added Date
:
Saturday, December 31, 2011
Researchers
Researcher Name (Arabic)
Researcher Name (English)
Researcher Type
Dr Grade
Email
جبراكاش كار
Kar, Jayaprakash
Researcher
Master
jayaprakashkar@yahoo.com
Files
File Name
Type
Description
31880.pdf
pdf
ID-based Deniable Authentication Protocol Suitable for Mobile devices
Back To Researches Page