Deniable authentication protocol based on factoring and discrete logarithm problems

A receiver can determine the genuine source of a message using a deniable authentication protocol without having to reveal the identity of the sender to a third party. In terms of communication overhead, the non-interactive protocol is more effective than the interactive protocol. It is suggested th...

Full description

Bibliographic Details
Main Authors: Nek Abd Rahman, Normahirah, Ismail, Eddie Shahril, Laham, Mohamed Faris
Format: Conference or Workshop Item
Published: IEEE 2022
Online Access:http://psasir.upm.edu.my/id/eprint/37758/
_version_ 1848848693407514624
author Nek Abd Rahman, Normahirah
Ismail, Eddie Shahril
Laham, Mohamed Faris
author_facet Nek Abd Rahman, Normahirah
Ismail, Eddie Shahril
Laham, Mohamed Faris
author_sort Nek Abd Rahman, Normahirah
building UPM Institutional Repository
collection Online Access
description A receiver can determine the genuine source of a message using a deniable authentication protocol without having to reveal the identity of the sender to a third party. In terms of communication overhead, the non-interactive protocol is more effective than the interactive protocol. It is suggested that the factoring and discrete logarithm problems may be solved in the future. When it happens, any non-interactive deniable authentication protocols that rely on one of these problems will be considered insecure. The primary goal of designing a protocol based on numerous hard problems is one of the strategies for overcoming this issue due to the unlikely solving of two hard problems simultaneously. Hence, it is necessary to design a deniable authentication protocol that is non-interactive and secure. Thus, this research proposes a new deniable authentication protocol to improve the previous protocol in which the core security is based on a single hard problem. The efficiency performance of suggested protocol only requires 961TMuL + 2THAS time complexity for signing and verifying. This magnitude of complexity is considered minimal for multiple hard problems deniable authentication protocol. The improvement has been made to provide a higher security level than the other protocol based on a single hard problem. The security of the algorithm depends on how difficult it is to simultaneously solve factoring and discrete logarithm problems.
first_indexed 2025-11-15T09:38:33Z
format Conference or Workshop Item
id upm-37758
institution Universiti Putra Malaysia
institution_category Local University
last_indexed 2025-11-15T09:38:33Z
publishDate 2022
publisher IEEE
recordtype eprints
repository_type Digital Repository
spelling upm-377582023-10-17T07:48:26Z http://psasir.upm.edu.my/id/eprint/37758/ Deniable authentication protocol based on factoring and discrete logarithm problems Nek Abd Rahman, Normahirah Ismail, Eddie Shahril Laham, Mohamed Faris A receiver can determine the genuine source of a message using a deniable authentication protocol without having to reveal the identity of the sender to a third party. In terms of communication overhead, the non-interactive protocol is more effective than the interactive protocol. It is suggested that the factoring and discrete logarithm problems may be solved in the future. When it happens, any non-interactive deniable authentication protocols that rely on one of these problems will be considered insecure. The primary goal of designing a protocol based on numerous hard problems is one of the strategies for overcoming this issue due to the unlikely solving of two hard problems simultaneously. Hence, it is necessary to design a deniable authentication protocol that is non-interactive and secure. Thus, this research proposes a new deniable authentication protocol to improve the previous protocol in which the core security is based on a single hard problem. The efficiency performance of suggested protocol only requires 961TMuL + 2THAS time complexity for signing and verifying. This magnitude of complexity is considered minimal for multiple hard problems deniable authentication protocol. The improvement has been made to provide a higher security level than the other protocol based on a single hard problem. The security of the algorithm depends on how difficult it is to simultaneously solve factoring and discrete logarithm problems. IEEE 2022 Conference or Workshop Item PeerReviewed Nek Abd Rahman, Normahirah and Ismail, Eddie Shahril and Laham, Mohamed Faris (2022) Deniable authentication protocol based on factoring and discrete logarithm problems. In: 2022 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE), 18-20 Dec. 2022, Gold Coast, Australia. . https://ieeexplore.ieee.org/document/10089279 10.1109/CSDE56538.2022.10089279
spellingShingle Nek Abd Rahman, Normahirah
Ismail, Eddie Shahril
Laham, Mohamed Faris
Deniable authentication protocol based on factoring and discrete logarithm problems
title Deniable authentication protocol based on factoring and discrete logarithm problems
title_full Deniable authentication protocol based on factoring and discrete logarithm problems
title_fullStr Deniable authentication protocol based on factoring and discrete logarithm problems
title_full_unstemmed Deniable authentication protocol based on factoring and discrete logarithm problems
title_short Deniable authentication protocol based on factoring and discrete logarithm problems
title_sort deniable authentication protocol based on factoring and discrete logarithm problems
url http://psasir.upm.edu.my/id/eprint/37758/
http://psasir.upm.edu.my/id/eprint/37758/
http://psasir.upm.edu.my/id/eprint/37758/