SINGLE PUBLIC-KEY AUTHENTICATION SCHEME FOR MULTIPLE USERS.

被引:0
|
作者
Okamoto, Tatsuaki [1 ]
机构
[1] NTT, Yokosuka, Jpn, NTT, Yokosuka, Jpn
关键词
COMPUTER SYSTEMS PROGRAMMING - Security Systems - DATA PROCESSING - Security of Data;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a new user authentication scheme, which does not require a management file for users' passwords. It has a high security, realizing the authentication of a large number of users by a single public key. Because of this property, the proposed system has merits in the application to off-line and mutual authentication. The scheme is also useful in the authentication in a large system with a large number of users. The system is constructed using the public-key digital signature and a oneway function with the commutative property. An example is presented where RSA is employed as the digital signature and the congruent exponential function is employed as the one-way function.
引用
收藏
页码:14 / 24
相关论文
共 50 条
  • [41] A public-key encryption scheme with pseudo-random ciphertexts
    Möller, B
    COMPUTER SECURITY ESORICS 2004, PROCEEDINGS, 2004, 3193 : 335 - 351
  • [42] Efficient certificate-based public-key encryption scheme
    Information Security and National Grid Computing Laboratory, Southwest Jiaotong University, Chengdu 610031, China
    Tien Tzu Hsueh Pao, 2008, 10 (2055-2059): : 2055 - 2059
  • [43] A public-key cryptossystem scheme on conic curves over Zn
    Chen, Zhi-Gang
    Song, Xin-Xia
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2183 - +
  • [44] A "medium-field" multivariate public-key encryption scheme
    Wang, LC
    Yang, BY
    Hu, YH
    Lai, FP
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 132 - 149
  • [45] A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE
    Jiang Zhengtao Hao Yanhua Wang Yumin (National Key Lab of Integrated Service Networks
    Journal of Electronics(China), 2005, (05) : 490 - 497
  • [46] A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate
    Chen, Yi-Ruei
    Tzeng, Wen-Guey
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 121 - 134
  • [47] A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
    Cheon, Jung Hee
    Kim, Jinsu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (05) : 1052 - 1063
  • [48] Improvement in public-key encryption and key exchange scheme based on Chebyshev polynomials
    School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
    不详
    不详
    Tiedao Xuebao, 2006, 5 (95-98):
  • [49] An Efficient Public-Key Dual-Receiver Encryption Scheme
    Gao, Chenglong
    Chen, Kai
    Wang, Qiang
    Chen, Zhixian
    IEEE ACCESS, 2022, 10 : 10799 - 10805
  • [50] A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE
    Jiang Zhengtao Hao Yanhua Wang Yumin National Key Lab of Integrated Service Networks Xidian Univ Xian China
    Journal of Electronics, 2005, (05) : 490 - 497