Cryptanalysis of two ID-based deniable authentication protocol from pairings

Tianjie Cao,Yingying Kan
2009-01-01
Journal of Information and Computational Science
Abstract:On ICCSA 2007 and ICISS 2008, Lim et al.'s proposed two improved ID-based deniable authentication protocol from pairings to resist the key-compromise impersonation (KCI) attack. However in this paper, we show that both of Lim et al.'s protocols suffer from the KCI attack. In our attacks, when the longterm key of an entity A is compromised, the adversary may be able to masquerade not only as A but also to A as another party B. © 2009 Binary Information Press.
What problem does this paper attempt to address?