The deniable authentication protocol is an important notion that allows a receiver to identify the source of a given message, but not to prove the identity of the sender to a third party. Such property is very useful ...
supported by the National Natural Science Foundation of China under Grant No.61003230,No.61370026,No.61103206,and No.61300191;Chongqing Key Lab of Computer Network and Communication Technology under Grant No.CY-CNCL-2012-02
Without the assumption that the private keys are kept secure perfectly, cryptographic primitives cannot be deployed in the insecure environments where the key leakage is inevitable. In order to reduce the damage cause...
In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an i...