Practical deniable authentication for pervasive computing environments
Autor: | Jiaojiao Hong, Anyembe Andrew Omala, Fagen Li |
---|---|
Rok vydání: | 2016 |
Předmět: |
Authentication
Ubiquitous computing Deniable authentication Computer Networks and Communications business.industry Computer science 020206 networking & telecommunications Cryptography Public key infrastructure 02 engineering and technology Computer security computer.software_genre Random oracle 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing Electrical and Electronic Engineering business computer Protocol (object-oriented programming) Information Systems Computer network |
Zdroj: | Wireless Networks. 24:139-149 |
ISSN: | 1572-8196 1022-0038 |
DOI: | 10.1007/s11276-016-1317-9 |
Popis: | Pervasive computing environments allow users to get services anytime and anywhere. Security has become a great challenge in pervasive computing environments because of its heterogeneity, openness, mobility and dynamicity. In this paper, we propose two heterogeneous deniable authentication protocols for pervasive computing environments using bilinear pairings. The first protocol allows a sender in a public key infrastructure (PKI) environment to send a message to a receiver in an identity-based cryptography (IBC) environment. The second protocol allows a sender in the IBC environment to send a message to a receiver in the PKI environment. Our protocols admits formal security proof in the random oracle model under the bilinear Diffie–Hellman assumption. In addition, our protocols support batch verification that can speed up the verification of authenticators. The characteristic makes our protocols useful in pervasive computing environments. |
Databáze: | OpenAIRE |
Externí odkaz: |