A secure key authentication scheme for cryptosystems based on GDLP and IFP

被引:0
|
作者
Chandrashekhar Meshram
Cheng-Chi Lee
Chun-Ta Li
Chin-Ling Chen
机构
[1] Rani Durgavati University,Department of Mathematics and Computer Science
[2] RTM Nagpur University,Department of Mathematics
[3] Fu Jen Catholic University,Department of Library and Information Science
[4] Asia University,Department of Photonics and Communication Engineering
[5] Tainan University of Technology,Department of Information Management
[6] Chaoyang University of Technology,Department of Computer Science and Information Engineering
来源
Soft Computing | 2017年 / 21卷
关键词
Public-key cryptosystem; Authentication scheme; Integer factorization problem (IFP); Certificate-based scheme; Generalized discrete logarithm problem (GDLP);
D O I
暂无
中图分类号
学科分类号
摘要
The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not change the fact that the one-and-only Internet still remains open and unprotected. Therefore, for the sake of information security, confirming the legality of an entity’s public key is always critical. Typically, a key authentication scheme needs one or more authorities to authenticate keys. To make a difference, in this study, we have developed a new key authentication scheme using generalized discrete logarithm problem and integer factorization problem for cryptosystems. Although the new scheme works pretty much the same way as regular certificate-based techniques, it differs in that it needs no authority. Taking the password/secret key pair as the certificate of public key for an entity, the new key authentication technique is very simple but profoundly secure.
引用
收藏
页码:7285 / 7291
页数:6
相关论文
共 50 条
  • [21] A Secure Two-Factor Authentication Key Exchange Scheme
    Han, Yunxia
    Xu, Chunxiang
    Jiang, Changsong
    Chen, Kefei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5681 - 5693
  • [22] A Secure Authentication and Key Management Scheme for Wireless Sensor Networks
    Khan, Sarmadullah
    Khan, Rafiullah
    SENSOR SYSTEMS AND SOFTWARE, 2015, 143 : 51 - 60
  • [23] Secure authentication and session key management scheme for Internet of Vehicles
    Sharma, Nishant
    Chauhan, Naveen
    Chand, Narottam
    Awasthi, Lalit Kumar
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (05):
  • [24] A More Secure and Efficient Remote Authentication Scheme with Key Agreement
    Guo, Dianli
    Wen, Fengtong
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ELECTRIC AND ELECTRONICS, 2013, : 119 - 122
  • [25] Secure Authentication and Group Key Distribution Scheme for WBANs Based on Smartphone ECG Sensor
    Tan, Haowen
    Chung, Ilyong
    IEEE ACCESS, 2019, 7 : 151459 - 151474
  • [26] An ECC Based Secure Authentication and Key Exchange Scheme in Multi-server Environment
    Ashish Tomar
    Joydip Dhar
    Wireless Personal Communications, 2019, 107 : 351 - 372
  • [27] A secure password-based authentication and key agreement scheme using smart cards
    Mishra, Dheerendra
    Das, Ashok Kumar
    Chaturvedi, Ankita
    Mukhopadhyay, Sourav
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 23 : 28 - 43
  • [28] A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs
    Kumari, Saru
    Renuka, Km.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (03)
  • [29] An ECC Based Secure Authentication and Key Exchange Scheme in Multi-server Environment
    Tomar, Ashish
    Dhar, Joydip
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (01) : 351 - 372
  • [30] A probably secure biometric-based authentication and key agreement scheme for Internet of Drones
    Gautam, Deepika
    Rana, Aryan
    Obaidat, Mohammad S.
    Kumar, Pankaj
    Prajapat, Sunil
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (01):