Authors
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
Publication date
2006/10/30
Book
Proceedings of the 13th ACM conference on Computer and communications security
Pages
400-409
Description
We extend the definitional work of Dwork,Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability features of SKEME and SIGMA, two natural and efficient protocols which serve as basis for the Internet Key Exchange (IKE)protocol.SKEME is an encryption-based protocol for which we prove full deniability based on the plaintext awareness of the underlying encryption scheme. Interestingly SKEME's deniability is possibly the first "natural" application which essentially requires plaintext awareness (until now this notion has been mainly used as a tool for proving chosen-ciphertext security).SIGMA, on the other hand,uses non-repudiable signatures for authentication and hence cannot be proven to be fully deniable. Yet we are able to prove a weaker, but meaningful, "partial deniability" property: a party may not be able to deny that it was …
Total citations
20052006200720082009201020112012201320142015201620172018201920202021202220232024123948104141411351281481396
Scholar articles
M Di Raimondo, R Gennaro, H Krawczyk - Proceedings of the 13th ACM conference on Computer …, 2006