Key authentication scheme for cryptosystems based on discrete logarithms

Protecting public keys against intruders is very important in public key cryptosystems. Most key authentication schemes require one or more authorities to authenticate keys. In this paper, we propose a new scheme for cryptosystems based on discrete logarithms. It is similar to the conventional certi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computer communications 1996-08, Vol.19 (9), p.848-850
Hauptverfasser: Horng, Gwoboa, Yang, C.S.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Protecting public keys against intruders is very important in public key cryptosystems. Most key authentication schemes require one or more authorities to authenticate keys. In this paper, we propose a new scheme for cryptosystems based on discrete logarithms. It is similar to the conventional certificate-based schemes, yet it requires no authorities. The certificate of the public key of a user is a combination of his password and private key. Our scheme is highly secure and the authentication process is very simple.
ISSN:0140-3664
1873-703X
DOI:10.1016/S0140-3664(96)01112-7