SINGLE PUBLIC-KEY AUTHENTICATION SCHEME FOR MULTIPLE USERS.

被引:0
|
作者
Okamoto, Tatsuaki [1 ]
机构
[1] NTT, Yokosuka, Jpn, NTT, Yokosuka, Jpn
关键词
COMPUTER SYSTEMS PROGRAMMING - Security Systems - DATA PROCESSING - Security of Data;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a new user authentication scheme, which does not require a management file for users' passwords. It has a high security, realizing the authentication of a large number of users by a single public key. Because of this property, the proposed system has merits in the application to off-line and mutual authentication. The scheme is also useful in the authentication in a large system with a large number of users. The system is constructed using the public-key digital signature and a oneway function with the commutative property. An example is presented where RSA is employed as the digital signature and the congruent exponential function is employed as the one-way function.
引用
收藏
页码:14 / 24
相关论文
共 50 条
  • [1] A SECURE PUBLIC-KEY AUTHENTICATION SCHEME
    GALIL, Z
    HABER, S
    YUNG, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 3 - 15
  • [2] A Scenario-Based Protocol Checker for Public-Key Authentication Scheme
    Saito, Takamichi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (06): : 1268 - 1279
  • [3] Parallel authentication and public-key encryption
    Pieprzyk, J
    Pointcheval, D
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 387 - 401
  • [4] A Public-key Cryptography and A Entity Authentication Scheme Based on Improved Hyperbolic Function
    Wang, Dahu
    Bai, Heyuan
    Liu, Qunpo
    Tong, Zhaojing
    IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, 2008, : 530 - 533
  • [5] Public-key encryption and authentication of quantum information
    Liang Min
    Yang Li
    SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2012, 55 (09) : 1618 - 1629
  • [6] A Secure Public-key Image Authentication Plan
    YANG Qing
    Wuhan University Journal of Natural Sciences, 2005, (01) : 289 - 292
  • [7] A public-key authentication watermarking for binary images
    Kim, HY
    de Queiroz, RL
    ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 3459 - 3462
  • [8] Public-key encryption and authentication of quantum information
    LIANG Min 1
    2 Graduate University of Chinese Academy of Sciences
    Science China(Physics,Mechanics & Astronomy), 2012, (09) : 1618 - 1629
  • [9] PASSWORD AUTHENTICATION USING PUBLIC-KEY CRYPTOGRAPHY
    HARN, L
    HUANG, D
    LAIH, CS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1989, 18 (12) : 1001 - 1017
  • [10] Public-key encryption and authentication of quantum information
    Min Liang
    Li Yang
    Science China Physics, Mechanics and Astronomy, 2012, 55 : 1618 - 1629