메뉴 건너뛰기




Volumn 8, Issue 5, 2009, Pages 625-642

Formalizing deniability

Author keywords

Deniable authentication protocol; Formal method; Strong deniability; Weak deniability

Indexed keywords

DENIABLE AUTHENTICATION; DENIABLE AUTHENTICATION PROTOCOL; FORMAL FRAMEWORK; NON-INTERACTIVE; STRONG DENIABILITY; WEAK DENIABILITY;

EID: 67651065167     PISSN: 18125638     EISSN: 18125646     Source Type: Journal    
DOI: 10.3923/itj.2009.625.642     Document Type: Article
Times cited : (6)

References (30)
  • 9
    • 0037019232 scopus 로고    scopus 로고
    • Deniable authentication protocol based on Diffie-Hellman algorithm
    • Fan, L., C. X. Xu and J. H. Li, 2002. Deniable authentication protocol based on Diffie-Hellman algorithm. Elect. Lett, 38:705-706.
    • (2002) Elect. Lett , vol.38 , pp. 705-706
    • Fan, L.1    Xu, C.X.2    Li, J.H.3
  • 10
    • 37349038164 scopus 로고    scopus 로고
    • Universally composable security concurrent deniable authentication based on witness indistinguishable
    • Feng, T. and J. F. Ma, 2007. Universally composable security concurrent deniable authentication based on witness indistinguishable. J. Software, 18:2871-2881.
    • (2007) J. Software , vol.18 , pp. 2871-2881
    • Feng, T.1    Ma, J.F.2
  • 11
    • 67651035866 scopus 로고    scopus 로고
    • Han, S., W. Q. Liu and E. Chang, 2005. Deniable authentication protocol resisting man-in-the-middle attack. Proceedings of world Academy of Science, Engineering and Technology, Jan. 2005, PWASET, pp:1-4.
    • Han, S., W. Q. Liu and E. Chang, 2005. Deniable authentication protocol resisting man-in-the-middle attack. Proceedings of world Academy of Science, Engineering and Technology, Jan. 2005, PWASET, pp:1-4.
  • 14
    • 33745689203 scopus 로고    scopus 로고
    • Accountability in electronic commerce protocols
    • Kailar, R., 1996. Accountability in electronic commerce protocols. IEEE Trans. Software Eng., 22:313-328.
    • (1996) IEEE Trans. Software Eng , vol.22 , pp. 313-328
    • Kailar, R.1
  • 16
    • 23144432349 scopus 로고    scopus 로고
    • Analysis of an electronic voting protocol in the applied Pi calculus
    • Kremer, S. and M. D. Ryan, 2005. Analysis of an electronic voting protocol in the applied Pi calculus. Lect. Notes Comput. Sci., 3444:186-200.
    • (2005) Lect. Notes Comput. Sci , vol.3444 , pp. 186-200
    • Kremer, S.1    Ryan, M.D.2
  • 17
    • 33845950814 scopus 로고    scopus 로고
    • A novel deniable authentication protocol using generalized El Gamal signature scheme
    • Lee, W. B., C. C. Wu and W. J. Tsaur, 2007. A novel deniable authentication protocol using generalized El Gamal signature scheme. Inform. Sci., 177:1376-1381.
    • (2007) Inform. Sci , vol.177 , pp. 1376-1381
    • Lee, W.B.1    Wu, C.C.2    Tsaur, W.J.3
  • 18
    • 26044448602 scopus 로고    scopus 로고
    • A new deniable authentication protocol from bilinear pairings
    • Lu, R. and Z. Cao, 2005a. A new deniable authentication protocol from bilinear pairings. Applied Math. Comput, 168:954-961.
    • (2005) Applied Math. Comput , vol.168 , pp. 954-961
    • Lu, R.1    Cao, Z.2
  • 19
    • 14844309431 scopus 로고    scopus 로고
    • Non-interactive deniable authentication protocol based on factoring
    • Lu, R. and Z. Cao, 2005b. Non-interactive deniable authentication protocol based on factoring. Comput. Standards Interfaces, 27:401-405.
    • (2005) Comput. Standards Interfaces , vol.27 , pp. 401-405
    • Lu, R.1    Cao, Z.2
  • 21
    • 49049110480 scopus 로고    scopus 로고
    • Analysis of internet voting protocols with jonker-vink receipt freeness formal model
    • Nov. 21-23, ICCIT, IEEE Computer Society, Washington, DC, pp
    • Meng, B., 2007. Analysis of internet voting protocols with jonker-vink receipt freeness formal model. Proceedings of the 2007 international Conference on Convergence information Technology, Nov. 21-23, ICCIT., IEEE Computer Society, Washington, DC, pp:663-669.
    • (2007) Proceedings of the 2007 international Conference on Convergence information Technology , pp. 663-669
    • Meng, B.1
  • 22
    • 57249084061 scopus 로고    scopus 로고
    • Meng, B., 2008. Formal analysis of key properties in the internet voting protocol using applied pi calculus. Inform. Technol. J., 7:1133-1140.
    • Meng, B., 2008. Formal analysis of key properties in the internet voting protocol using applied pi calculus. Inform. Technol. J., 7:1133-1140.
  • 23
    • 67651029682 scopus 로고    scopus 로고
    • A formal logic framework for receipt-freeness in internet voting protocol
    • Meng, B., 2009a. A formal logic framework for receipt-freeness in internet voting protocol. J. Comput, 4:184-192.
    • (2009) J. Comput , vol.4 , pp. 184-192
    • Meng, B.1
  • 24
    • 62749124406 scopus 로고    scopus 로고
    • Meng, B., 2009b. A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on Internet voting protocol. Inform. Technol. J., 8:302-309.
    • Meng, B., 2009b. A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on Internet voting protocol. Inform. Technol. J., 8:302-309.
  • 28
    • 2342455866 scopus 로고    scopus 로고
    • Efficient deniable authentication protocol based on generalized ElGamal signature scheme
    • Shao, Z., 2004. Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Comput. Standards Interfaces, 26:449-454.
    • (2004) Comput. Standards Interfaces , vol.26 , pp. 449-454
    • Shao, Z.1
  • 29
    • 15544375802 scopus 로고    scopus 로고
    • Identity-based deniable authentication protocol
    • Shi, Y. and J. Li, 2005. Identity-based deniable authentication protocol. Elect. Lett., 41:241-242.
    • (2005) Elect. Lett , vol.41 , pp. 241-242
    • Shi, Y.1    Li, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.