I. Introduction
In a mobile ad hoc network (MANET), a mobile device is allow to communicate with another mobile device dynamically by forwarding the data from one device to another device without the help of any router or access point and can create a network on the fly [1] – [4] . There are various applications of MANET like disaster rescue, army tactical, and healthcare [5] – [7] . During the communication between two mobile devices, the networks must provide security and privacy. The deniable authentication protocol is a security primitive for MANETs and is used in many scenarios such as secure message exchange, electronic voting, etc. There exist many deniable authentication protocols in the literature [8] – [13] . The deniable authentication protocols include two important properties which are: (i) the receivers can only verify the source of an intended message, and (ii) the receiver is unable to establish evidence to a third party that the source of an intended message has sent the message.