A secure key authentication scheme for cryptosystems based on GDLP and IFP

被引:0
|
作者
Chandrashekhar Meshram
Cheng-Chi Lee
Chun-Ta Li
Chin-Ling Chen
机构
[1] Rani Durgavati University,Department of Mathematics and Computer Science
[2] RTM Nagpur University,Department of Mathematics
[3] Fu Jen Catholic University,Department of Library and Information Science
[4] Asia University,Department of Photonics and Communication Engineering
[5] Tainan University of Technology,Department of Information Management
[6] Chaoyang University of Technology,Department of Computer Science and Information Engineering
来源
Soft Computing | 2017年 / 21卷
关键词
Public-key cryptosystem; Authentication scheme; Integer factorization problem (IFP); Certificate-based scheme; Generalized discrete logarithm problem (GDLP);
D O I
暂无
中图分类号
学科分类号
摘要
The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not change the fact that the one-and-only Internet still remains open and unprotected. Therefore, for the sake of information security, confirming the legality of an entity’s public key is always critical. Typically, a key authentication scheme needs one or more authorities to authenticate keys. To make a difference, in this study, we have developed a new key authentication scheme using generalized discrete logarithm problem and integer factorization problem for cryptosystems. Although the new scheme works pretty much the same way as regular certificate-based techniques, it differs in that it needs no authority. Taking the password/secret key pair as the certificate of public key for an entity, the new key authentication technique is very simple but profoundly secure.
引用
收藏
页码:7285 / 7291
页数:6
相关论文
共 50 条
  • [1] A secure key authentication scheme for cryptosystems based on GDLP and IFP
    Meshram, Chandrashekhar
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Chin-Ling
    SOFT COMPUTING, 2017, 21 (24) : 7285 - 7291
  • [2] A secure key authentication scheme for cryptosystems based on DLP in group ring
    Kumar, Sandeep
    Mittal, Gaurav
    Kumar, Sunil
    ANNALES MATHEMATICAE ET INFORMATICAE, 2024, 60 : 75 - 92
  • [3] Key authentication scheme for cryptosystems based on discrete logarithms
    Horng, G
    Yang, CS
    COMPUTER COMMUNICATIONS, 1996, 19 (9-10) : 848 - 850
  • [4] A new key authentication scheme for cryptosystems based on discrete logarithms
    Shao, ZH
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (01) : 143 - 152
  • [5] Secure Key Authentication Scheme Based on Discrete Logarithms
    Yoon, Eun-Jun
    Yoo, Kee-Young
    NWESP 2007: THIRD INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2007, : 73 - +
  • [6] Secure Pattern-Key Based Password Authentication Scheme
    Zaki, M. Hamza
    Husain, Adil
    Umar, M. Sarosh
    Khan, Muneeb H.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES (IMPACT), 2017, : 171 - 174
  • [7] Combining Steganography and Biometric Cryptosystems for Secure Mutual Authentication and Key Exchange
    Al-Assam, Hisham
    Rashid, Rasber
    Jassim, Sabah
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 369 - 374
  • [8] An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP
    Meshram, Chandrashekhar
    Tseng, Yuh-Min
    Lee, Cheng-Chi
    Meshram, Sarita Gajbhiye
    INFORMATICA, 2017, 28 (03) : 471 - 484
  • [9] An ID-based cryptographic mechanisms based on GDLP and IFP
    Meshram, Chandrashekhar
    Meshram, Suchitra A.
    Zhang, Mingwu
    INFORMATION PROCESSING LETTERS, 2012, 112 (19) : 753 - 758
  • [10] A new public key scheme based on DRSA and generalized GDLP
    Goswami, Pinkimani
    Singh, Madan Mohan
    Bhuyan, Bubu
    DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, 2016, 8 (04)