Key Authentication Scheme-based on Discrete Logarithms and Chinese Remainder Theorem
-
Published:2016-10-31
Issue:6
Volume:66
Page:590
-
ISSN:0976-464X
-
Container-title:Defence Science Journal
-
language:
-
Short-container-title:Def. Sc. Jl.
Author:
Kumaraswamy P.,Rao C.V. Guru,Janaki V.,Prashanth K.V.T.K.N.
Abstract
<p>Public key cryptosystems are secure only when the authenticity of the public key is assured. Shao proposed<br />a new scheme to overcome the problems of the existing schemes, which suffers from two major drawbacks. The<br />first drawback is the availability of users’ passwords in plaintext format in key server which are prone to attacks<br />by ill-minded users. The second one is depending on the key server blindly for certificate generation, without<br />further verification by the user. To overcome these severe drawbacks, we proposed an improved key authentication<br />scheme based on Chinese remainder theorem and discrete logarithms. Our scheme allows the user to generate his/<br />her certificate without the help of any trusted third party. This scheme is intended for online services, military and<br />defense applications to exchange keys securely.<br /> </p>
Publisher
Defence Scientific Information and Documentation Centre
Subject
Electrical and Electronic Engineering,Computer Science Applications,General Physics and Astronomy,Mechanical Engineering,Biomedical Engineering,General Chemical Engineering
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献