Composability and on-line deniability of authentication
Title | Composability and on-line deniability of authentication |
Publication Type | Journal Articles |
Year of Publication | 2009 |
Authors | Dodis Y, Katz J, Smith A, Walfish S |
Journal | Theory of Cryptography |
Pagination | 146 - 162 |
Date Published | 2009/// |
Abstract | Protocols for deniable authentication achieve seemingly paradoxical guarantees: upon completion of the protocol the receiver is convinced that the sender authenticated the message, but neither party can convince anyone else that the other party took part in the protocol. We introduce and study on-line deniability, where deniability should hold even when one of the parties colludes with a third party during execution of the protocol. This turns out to generalize several realistic scenarios that are outside the scope of previous models.We show that a protocol achieves our definition of on-line deniability if and only if it realizes the message authentication functionality in the generalized universal composability framework; any protocol satisfying our definition thus automatically inherits strong composability guarantees. Unfortunately, we show that our definition is impossible to realize in the PKI model if adaptive corruptions are allowed (even if secure erasure is assumed). On the other hand, we show feasibility with respect to static corruptions (giving the first separation in terms of feasibility between the static and adaptive setting), and show how to realize a relaxation termed deniability with incriminating abort under adaptive corruptions. |
DOI | 10.1007/978-3-642-00457-5_10 |