Abstract
In electronic communications and in access to systems, the issue of authentication of the Sender S of a message M, as well as of the message itself, is of paramount importance. Recently S. Goldwasser has raised the additional issue of Deniable Authentication where the sender S authenticates the message M to the Receiver's (R) satisfaction, but can later deny his authorship of M even to an Inquisitor INQ who has listened to the exchange between S and R and who gains access to all of the the secret information used by S and R. We present two practical schemes for Deniable Authentication of messages M of arbitrary length n. In both schemes the Receiver R is assured with probability greater than 1 − 2−k, where k is a chosen security parameter, that M originated with the Sender S. Deniability is absolute in the information theoretic sense. The first scheme requires 2.4kn XOR operations on bits and one public key encoding and decoding of a short message. The second scheme requires the same number of XOR operations and k multiplications mod N, where N is some fixed product of two large primes. A key new feature of our method is the use of a Shannon-style error correction code. Traditional authentication for a long message M starts by hashing Mdown to a standard word-size. We expand M through error correction. The first Deniable Authentication method is provably valid for any encryption scheme with minimal security properties, i.e. this method is generic. The second Deniable Authentication method is provably valid under the usual assumption that factorization is intractable.
Original language | English |
---|---|
Title of host publication | Advances in Cryptology – CRYPTO 1998 - 18th Annual International Cryptology Conference, Proceedings |
Editors | Hugo Krawczyk |
Publisher | Springer Verlag |
Pages | 299-303 |
Number of pages | 5 |
ISBN (Print) | 3540648925, 9783540648925 |
DOIs | |
State | Published - 1998 |
Event | 18th Annual International Cryptology Conference, CRYPTO 1998 - Santa Barbara, United States Duration: 23 Aug 1998 → 27 Aug 1998 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 1462 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 18th Annual International Cryptology Conference, CRYPTO 1998 |
---|---|
Country/Territory | United States |
City | Santa Barbara |
Period | 23/08/98 → 27/08/98 |
Bibliographical note
Publisher Copyright:© Springer-Verlag Berlin Heidelberg 1998.