Document Details

Document Type : Article In Conference 
Document Title :
ID-based Deniable Authentication Protocol Suitable for Mobile devices
نظام هوية يعتمد على بروتوكول مصادقة قابل للإنكار يناسب الأجهزة المتنقلة
 
Subject : Cryptographic Protocols 
Document Language : English 
Abstract : This paper describes a secure identity based deniable authentication protocol whose security is based on difficulty of breaking Diffe-Hellman Problem on Elliptic Curve (ECDHP) and hash function. Elliptic curve cryptosystem (ECC) has significant advantages like smaller key sizes, faster computations compared with other public-key cryptography. Since it is an ECC based authentication protocol, it can be implemented in mobile devices such as smart card, PDA etc. Deniable authentication protocol enables a receiver to identify the true source of a given message, But not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. 
Conference Name : 3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec 2011), Aalborg, Denmark. 
Duration : From : 1432 AH - To : 1432 AH
From : 2011 AD - To : 2011 AD
 
Publishing Year : 1432 AH
2011 AD
 
Number Of Pages : 12 
Article Type : Article 
Conference Place : Denmark 
Organizing Body : 3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems 
Added Date : Saturday, December 31, 2011 

Researchers

Researcher Name (Arabic)Researcher Name (English)Researcher TypeDr GradeEmail
جبراكاش كارKar, Jayaprakash ResearcherMasterjayaprakashkar@yahoo.com

Files

File NameTypeDescription
 31880.pdf pdfID-based Deniable Authentication Protocol Suitable for Mobile devices

Back To Researches Page