完整後設資料紀錄
DC 欄位語言
dc.contributor.authorSun, Hung-Min
dc.contributor.authorWang, King-Hang
dc.contributor.authorChang, Shih-Ying
dc.contributor.authorWan, Li
dc.date.accessioned2009-08-23T04:43:10Z
dc.date.accessioned2020-05-25T06:51:41Z-
dc.date.available2009-08-23T04:43:10Z
dc.date.available2020-05-25T06:51:41Z-
dc.date.issued2007-01-29T08:35:54Z
dc.date.submitted2006-12-04
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/3605-
dc.description.abstractFor some applications of message authentication, a sender may not want to be proven by a third party that he has sent some messages to a receiver. Deniable authentication protocols are designed to adopt this situation. A paper proposed by Chang et al. suggested a way to cryptanalyze previous works and names a new deniable authentication protocol. In this paper, we point out their work can be broken by a new proposed adaptive attacks. We further provide an adaptively secure protocol which can achieve forward secrecy. This is currently the only adaptive deniable authentication scheme which can achieve forward secrecy. In addition, we classify deniable protocols into four categories. A comparison of our protocol and other methods will be given at the end of this paper.
dc.description.sponsorship元智大學,中壢市
dc.format.extent6p.
dc.format.extent508365 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries2006 ICS會議
dc.subject.otherAuthentication and Digital Signatures
dc.titleAn Authentication Protocol Combining Deniability and Forward Secrecy for Resisting Adaptive Attacks
分類:2006年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002006000151.pdf496.45 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。