Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 20 Jan 2012

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Mitigating Phishing with ID-based Online/Offline Authentication

Ren, Q., Mu, Y. and Susilo, W.

    Enforcing strong authentication is an option to mitigate phishing. However, existing authentication methods, like traditional digital signatures, require unrealistic full deployment of public key infrastructure (PKI) and destroy email users' privacy in that the identity of an email sender is automatically revealed to the public. There have been some works in the literature, where the technology of deniable authentication is adopted and sender's privacy can be protected. However, the additional computation introduced into the system is obviously a drawback. In this paper, we introduce the notion of online/offline authentication into anti-phishing, in order to construct an efficient and secure anti-phishing scheme. It is commonly known that a generic online/offline signature can be constructed with a traditional chameleon function. Nevertheless, a standard chameleon function suffers from so-called key-exposure attacks. To tackle this issue, we propose an efficient chameleon function without key-exposure, which is especially suitable for constructing efficient online/offline signatures that are applicable to mitigating phishing. We also demonstrate how to apply our novel scheme to a traditional email system.
Cite as: Ren, Q., Mu, Y. and Susilo, W. (2008). Mitigating Phishing with ID-based Online/Offline Authentication. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds. ACS. 59-64.
pdf (from crpit.com) pdf (local if available) BibTeX EndNote GS
 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 16 Nov 2007