A secure key authentication scheme for cryptosystems based on GDLP and IFP

被引:0
|
作者
Chandrashekhar Meshram
Cheng-Chi Lee
Chun-Ta Li
Chin-Ling Chen
机构
[1] Rani Durgavati University,Department of Mathematics and Computer Science
[2] RTM Nagpur University,Department of Mathematics
[3] Fu Jen Catholic University,Department of Library and Information Science
[4] Asia University,Department of Photonics and Communication Engineering
[5] Tainan University of Technology,Department of Information Management
[6] Chaoyang University of Technology,Department of Computer Science and Information Engineering
来源
Soft Computing | 2017年 / 21卷
关键词
Public-key cryptosystem; Authentication scheme; Integer factorization problem (IFP); Certificate-based scheme; Generalized discrete logarithm problem (GDLP);
D O I
暂无
中图分类号
学科分类号
摘要
The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not change the fact that the one-and-only Internet still remains open and unprotected. Therefore, for the sake of information security, confirming the legality of an entity’s public key is always critical. Typically, a key authentication scheme needs one or more authorities to authenticate keys. To make a difference, in this study, we have developed a new key authentication scheme using generalized discrete logarithm problem and integer factorization problem for cryptosystems. Although the new scheme works pretty much the same way as regular certificate-based techniques, it differs in that it needs no authority. Taking the password/secret key pair as the certificate of public key for an entity, the new key authentication technique is very simple but profoundly secure.
引用
收藏
页码:7285 / 7291
页数:6
相关论文
共 50 条
  • [31] A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment
    Yu, Yicheng
    Hu, Liang
    Chu, Jianfeng
    SYMMETRY-BASEL, 2020, 12 (01):
  • [32] A more Multifactor Secure Authentication Scheme based on graphical authentication
    Joshi, Ashish
    Kumar, Sonu
    Goudar, R. H.
    2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC), 2012, : 186 - 189
  • [33] An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems
    Lidong Han
    Xiao Tan
    Shengbao Wang
    Xikun Liang
    Peer-to-Peer Networking and Applications, 2018, 11 : 63 - 73
  • [34] A secure authentication scheme based on fuzzy extractor
    Zhang, Lihua
    Nie, Yaoping
    Computer Modelling and New Technologies, 2014, 18 (12): : 46 - 55
  • [35] An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems
    Han, Lidong
    Tan, Xiao
    Wang, Shengbao
    Liang, Xikun
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (01) : 63 - 73
  • [36] Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
    Rosario Gennaro
    Stanislaw Jarecki
    Hugo Krawczyk
    Tal Rabin
    Journal of Cryptology, 2007, 20 : 51 - 83
  • [37] An efficient secure key issuing protocol in ID-based cryptosystems
    Gangishetti, R
    Gorantla, MC
    Das, ML
    Saxena, A
    Gulati, VP
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 674 - 678
  • [38] Secure key-evolving for public key cryptosystems based on the discrete logarithm problem
    Lu, CF
    Shieh, SP
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2004, 20 (02) : 391 - 400
  • [39] Ring signature scheme based on multivariate public key cryptosystems
    Wang, Shangping
    Ma, Rui
    Zhang, Yaling
    Wang, Xiaofeng
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 62 (10) : 3973 - 3979
  • [40] An anonymous and secure authentication and key agreement scheme for session initiation protocol
    Lin, Hao
    Wen, Fengtong
    Du, Chunxia
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) : 2315 - 2329