SINGLE PUBLIC-KEY AUTHENTICATION SCHEME FOR MULTIPLE USERS.

被引:0
|
作者
Okamoto, Tatsuaki [1 ]
机构
[1] NTT, Yokosuka, Jpn, NTT, Yokosuka, Jpn
关键词
COMPUTER SYSTEMS PROGRAMMING - Security Systems - DATA PROCESSING - Security of Data;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a new user authentication scheme, which does not require a management file for users' passwords. It has a high security, realizing the authentication of a large number of users by a single public key. Because of this property, the proposed system has merits in the application to off-line and mutual authentication. The scheme is also useful in the authentication in a large system with a large number of users. The system is constructed using the public-key digital signature and a oneway function with the commutative property. An example is presented where RSA is employed as the digital signature and the congruent exponential function is employed as the one-way function.
引用
收藏
页码:14 / 24
相关论文
共 50 条
  • [31] Combining Public-Key Encryption with Digital Signature Scheme
    Alia, Mohammad Ahmad
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2016, 2017, 533 : 870 - 878
  • [32] Public key authentication scheme over quaternions
    Valluri, Maheswara Rao
    Narayan, Shailendra Vikash
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (01): : 169 - 181
  • [33] TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage
    Mu Han
    Puyi Xu
    Lei Xu
    Chungen Xu
    Peer-to-Peer Networking and Applications, 2023, 16 : 156 - 169
  • [34] TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage
    Han, Mu
    Xu, Puyi
    Xu, Lei
    Xu, Chungen
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (01) : 156 - 169
  • [35] An Enhanced Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography
    Luo, Ming
    Wen, Yingyou
    Zhao, Hong
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1577 - 1582
  • [36] Anonymous Authentication from Public-Key Encryption Revisited (Extended Abstract)
    Slamanig, Daniel
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 247 - 249
  • [37] A novel approach to on-line status authentication of public-key certificates
    Faldella, E
    Prandini, M
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 270 - 277
  • [38] A public-key quantum group blind signature scheme based on single-qubit rotations
    Tian, Fuyao
    Lu, Dianjun
    Wang, Chengxiang
    Yao, Weixin
    LASER PHYSICS LETTERS, 2024, 21 (03)
  • [39] Secure public-key encryption scheme without random oracles
    Tan, Chik How
    INFORMATION SCIENCES, 2008, 178 (17) : 3435 - 3442
  • [40] Public-key based security scheme for wireless sensor network
    Chen, Jiann-Liang
    Lai, Yin-Fu
    Lu, Hsi-Feng
    Kuo, Quan-Cheng
    2008 IEEE RADIO AND WIRELESS SYMPOSIUM, VOLS 1 AND 2, 2008, : 255 - 258