Authenticated Key Exchange, Signcryption and Deniable Signcryption Protocols Based on Two Hard Problems

Do Viet Binh, Nguyen Hieu Minh, Nguyen Nam Hai, Junbeom Hur, Dang Hoang Minh, Ho Sy Tan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Arazi was the first author to propose the integration of a key exchange protocol with a digital signature algorithm. Other authors have subsequently proposed methods to increase the level of security and achieve the necessary properties of authenticated key exchange protocols. However, these proposals exhibit several weaknesses and the majority of these protocols are based only on a single hard problem. In this paper, we propose a new secured key exchange protocol which is based on two hard problems. We then extend this to a signcryption protocol and a deniable signcryption protocol. These protocols represent the first steps in a new direction, but they are designed based on two hard problems. The security proofs for the new protocols confirm their novelty and security.

Original languageEnglish
Title of host publicationProceedings - 2017 International Conference on Advanced Computing and Applications, ACOMP 2017
EditorsKoichiro Ishibashi, Josef Kung, Lam-Son Le, Nam Thoai, Tran Khanh Dang
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages16-22
Number of pages7
ISBN (Electronic)9781538606070
DOIs
Publication statusPublished - 2018 Jun 21
Event2017 International Conference on Advanced Computing and Applications, ACOMP 2017 - Ho Chi Minh City, Viet Nam
Duration: 2017 Nov 292017 Dec 1

Publication series

NameProceedings - 2017 International Conference on Advanced Computing and Applications, ACOMP 2017

Conference

Conference2017 International Conference on Advanced Computing and Applications, ACOMP 2017
CountryViet Nam
CityHo Chi Minh City
Period17/11/2917/12/1

Keywords

  • Authentication
  • deniable
  • hard problem
  • key exchange
  • signcryption

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture

Fingerprint Dive into the research topics of 'Authenticated Key Exchange, Signcryption and Deniable Signcryption Protocols Based on Two Hard Problems'. Together they form a unique fingerprint.

  • Cite this

    Binh, D. V., Minh, N. H., Hai, N. N., Hur, J., Minh, D. H., & Tan, H. S. (2018). Authenticated Key Exchange, Signcryption and Deniable Signcryption Protocols Based on Two Hard Problems. In K. Ishibashi, J. Kung, L-S. Le, N. Thoai, & T. K. Dang (Eds.), Proceedings - 2017 International Conference on Advanced Computing and Applications, ACOMP 2017 (pp. 16-22). (Proceedings - 2017 International Conference on Advanced Computing and Applications, ACOMP 2017). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ACOMP.2017.12