Paper 2007/383

Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol

Meng-Hui Lim, Sanggon Lee, and Hoonjae Lee


A deniable authentication protocol enables the protocol participants to authenticate their respective peers, while able to deny their participation after the protocol execution. This protocol can be extremely useful in some practical applications such as online negotiation, online shopping and electronic voting. Recently, we have improved a deniable authentication scheme proposed by Chou et al. due to its vulnerability to the key compromise impersonation attack in our previous report. However, we have later discovered that our previous enhanced protocol is vulnerable to the insider key compromise impersonation attack and key replicating attack. In this paper, we will again secure this protocol against these attacks and demonstrate its heuristic security analysis.

Available format(s)
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Identity-BasedDeniableKey Agreement ProtocolCryptanalysis
Contact author(s)
meng17121983 @ yahoo com
2007-10-04: received
Short URL
Creative Commons Attribution


      author = {Meng-Hui Lim and Sanggon Lee and Hoonjae Lee},
      title = {Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol},
      howpublished = {Cryptology ePrint Archive, Paper 2007/383},
      year = {2007},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.