Abstract
E-mail brings us lots of conveniences. Especially with help of PGP and S/MIME, it gives both confidentiality and message/origin authentication. However, in some cases for strong privacy, a message sender will not want to let others know even the fact that he sent a message to a recipient. Very recently, Harn and Ren proposed a fully deniable authentication scheme for E-mail where a sender can repudiate his or her signature. In this paper, however, their deniable authentication scheme is proved not to be fully deniable. To resolve this deniability problem, we suggest a designated verifier signature scheme to support strong privacy, and construct a privacy-enhanced deniable authentication E-mail scheme using the designated verifier signature scheme. Compared with the Harn and Ren’s scheme, the proposed scheme has a simple cryptographic structure and can be easily realized with the existing secure E-mail systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
S/MIME: Secure Multipuepose Internet Mail Extensions, http://www.rsasecurity.com/standards/smime/
OpenPGP: An Open Specification for Pretty Good Privacy, http://www.ietf.org/html.charters/openpgp-charter.html
Harn, L., Ren, J.: Design of Fully Deniable Authentication Service for E-mail Applications. IEEE Communications Letters 12(3), 219–221 (2008)
Jakobsson, M., Sako, K., Impagliazzo, R.: Designated Verifier Proofs and Their Applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)
Saeednia, S., Kramer, S., Markovitch, O.: An Efficient Strong Designated Verifier Signature Scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 40–54. Springer, Heidelberg (2004)
Dolev, D., Dwork, C., Naor, M.: Non-malleable Cryptography. SIAM Journal on Computing 30(2), 391–437 (2000)
Rackoff, C., Simon, D.: Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433–444. Springer, Heidelberg (1992)
Fujisaki, E., Okamoto, T., Pointcheval, D., Stern, J.: RSA-OAEP is secure under the RSA assumption. J. of Cryptology 17(2), 81–104 (2004)
Sun, H., Hsieh, B., Hwang, H.: Secure E-mail Protocols Providing Perfect Forward Secrecy. IEEE Communications Letters 9(1), 58–60 (2005)
Dent, A.W.: Flaws in an E-mail Protocol of Sun, Hsieh, and Hwang. IEEE Communications Letters 9(8), 7180–7719 (2005)
Kim, B.H., Koo, J.H., Lee, D.H.: Robust E-mail Protocols with Perfect Forward Secrecy. IEEE Communications Letters 10(6), 510–512 (2006)
Yoon, E.J., Yoo, K.Y.: Cryptanalysis of Robust E-mail Protocols with Perfect Forward Secrecy. IEEE Communications Letters 11(56), 372–374 (2007)
Aumann, Y., Rabin, M.O.: Authentication, enhanced security and error correcting codes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 299–303. Springer, Heidelberg (1998)
Jakobsson, M., Sako, K., Impagliazzo, R.: Designated Verifier Proofs and their Applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)
Huang, X., Susilo, W., Mu, Y., Zhang, F.: Short (Identity-Based) Strong Designated Verifier Signature Schemes. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds.) ISPEC 2006. LNCS, vol. 3903, pp. 214–225. Springer, Heidelberg (2006)
Laguillaumie, F., Vergnaud, D.: Designated Verifiers Signature: Anonymity and Efficient Construction from any Bilinear Map. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 105–119. Springer, Heidelberg (2005)
Laguillaumie, F., Vergnaud, D.: Multi-designated Verifiers Signatures. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 495–507. Springer, Heidelberg (2004)
Zhang, J., Mao, J.: A Novel ID-Based Designated Verifier Signature Scheme. Information Sciences 178, 733–766 (2008)
Rivest, R., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)
Saeednia, S., Kramer, S., Markovitch, O.: An Efficient Strong Designated Verifier Signature Scheme. In: Yazıcı, A., Şener, C. (eds.) ISCIS 2003. LNCS, vol. 2869, pp. 40–54. Springer, Heidelberg (2003)
Susilo, W., Zhang, F., Mu, Y.: Identity-based Strong Designated Verifier Signature Schemes. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 313–324. Springer, Heidelberg (2004)
Cramer, R., Shoup, V.: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack. SIAM Journal on Computing 33(1), 167–226 (2003)
Bender, A., Katz, J., Morselli, R.: Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 60–79. Springer, Heidelberg (2006)
Lee, J., Chang, J.K., Lee, D.H.: Forgery attacks on Kang et al.’s Identity-Based Strong Designated Verifier Signature Scheme and its improvement with security proof. Computers and Electrical Engineering 35, 49–53 (2009)
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ki, J., Yeong Hwang, J., Nyang, D., Hoon Lee, D., Lim, J. (2011). Privacy-Enhanced Deniable Authentication E-Mail Service. In: Ariwa, E., El-Qawasmeh, E. (eds) Digital Enterprise and Information Systems. DEIS 2011. Communications in Computer and Information Science, vol 194. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22603-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-22603-8_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22602-1
Online ISBN: 978-3-642-22603-8
eBook Packages: Computer ScienceComputer Science (R0)