The development of deniable authentication protocol based on the bivariate function hard problem

A deniable authentication protocol enables a receiver to identify the true source of a given message but not to prove the identity of the sender to the third party. Non-interactive protocol is more efficient than interactive protocol in terms of communication overhead, and thus several non-interacti...

Full description

Saved in:
Bibliographic Details
Main Authors: Nek Abdul Rahman, Normahirah, Kamel Ariffin, Muhammad Rezal
Format: Article
Language:English
Published: Femto Technique 2016
Online Access:http://psasir.upm.edu.my/id/eprint/3638/1/The%20development%20of%20deniable%20authentication%20protocol%20based%20on%20the%20bivariate%20function%20hard%20problem.pdf
http://psasir.upm.edu.my/id/eprint/3638/
http://ijns.jalaxy.com.tw/contents/ijns-v18-n1/ijns-v18-n1.html
Tags: Add Tag
No Tags, Be the first to tag this record!