{"title":"可否认环认证私钥建立","authors":"E.T. Taniguchi, H. Yamamoto","doi":"10.1109/ISITA.2008.4895467","DOIUrl":null,"url":null,"abstract":"In this paper, we extend the work by M. Naor [7] on deniable ring authentication to include key establishment. Two secure deniable private key establishment protocols will be proposed. These two related schemes create only a secure private channel between Alice and Bob where the identity of Bob remains completely hidden. The first scheme does not require Alice to been within the user set S and in fact does not even require Alice to have a public-private key pair. The second scheme requires that Alice choose a user set S such that she is also within set S. This scheme also indirectly requires that Alice have a public-private key pair. Similar to the deniable ring authentication protocol by Naor, the protocols proposed here only assumes the existence of strong public key encryption schemes where all members have already established public and private keys. Finally, the problem of ciphertext search and ciphertext ambiguity will also be examined and a solution will be proposed.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"EM-28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Deniable ring authenticated private key establishment\",\"authors\":\"E.T. Taniguchi, H. Yamamoto\",\"doi\":\"10.1109/ISITA.2008.4895467\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we extend the work by M. Naor [7] on deniable ring authentication to include key establishment. Two secure deniable private key establishment protocols will be proposed. These two related schemes create only a secure private channel between Alice and Bob where the identity of Bob remains completely hidden. The first scheme does not require Alice to been within the user set S and in fact does not even require Alice to have a public-private key pair. The second scheme requires that Alice choose a user set S such that she is also within set S. This scheme also indirectly requires that Alice have a public-private key pair. Similar to the deniable ring authentication protocol by Naor, the protocols proposed here only assumes the existence of strong public key encryption schemes where all members have already established public and private keys. Finally, the problem of ciphertext search and ciphertext ambiguity will also be examined and a solution will be proposed.\",\"PeriodicalId\":338675,\"journal\":{\"name\":\"2008 International Symposium on Information Theory and Its Applications\",\"volume\":\"EM-28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Symposium on Information Theory and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISITA.2008.4895467\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Symposium on Information Theory and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISITA.2008.4895467","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Deniable ring authenticated private key establishment
In this paper, we extend the work by M. Naor [7] on deniable ring authentication to include key establishment. Two secure deniable private key establishment protocols will be proposed. These two related schemes create only a secure private channel between Alice and Bob where the identity of Bob remains completely hidden. The first scheme does not require Alice to been within the user set S and in fact does not even require Alice to have a public-private key pair. The second scheme requires that Alice choose a user set S such that she is also within set S. This scheme also indirectly requires that Alice have a public-private key pair. Similar to the deniable ring authentication protocol by Naor, the protocols proposed here only assumes the existence of strong public key encryption schemes where all members have already established public and private keys. Finally, the problem of ciphertext search and ciphertext ambiguity will also be examined and a solution will be proposed.