A secure key authentication scheme for cryptosystems based on GDLP and IFP

被引:0
|
作者
Chandrashekhar Meshram
Cheng-Chi Lee
Chun-Ta Li
Chin-Ling Chen
机构
[1] Rani Durgavati University,Department of Mathematics and Computer Science
[2] RTM Nagpur University,Department of Mathematics
[3] Fu Jen Catholic University,Department of Library and Information Science
[4] Asia University,Department of Photonics and Communication Engineering
[5] Tainan University of Technology,Department of Information Management
[6] Chaoyang University of Technology,Department of Computer Science and Information Engineering
来源
Soft Computing | 2017年 / 21卷
关键词
Public-key cryptosystem; Authentication scheme; Integer factorization problem (IFP); Certificate-based scheme; Generalized discrete logarithm problem (GDLP);
D O I
暂无
中图分类号
学科分类号
摘要
The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not change the fact that the one-and-only Internet still remains open and unprotected. Therefore, for the sake of information security, confirming the legality of an entity’s public key is always critical. Typically, a key authentication scheme needs one or more authorities to authenticate keys. To make a difference, in this study, we have developed a new key authentication scheme using generalized discrete logarithm problem and integer factorization problem for cryptosystems. Although the new scheme works pretty much the same way as regular certificate-based techniques, it differs in that it needs no authority. Taking the password/secret key pair as the certificate of public key for an entity, the new key authentication technique is very simple but profoundly secure.
引用
收藏
页码:7285 / 7291
页数:6
相关论文
共 50 条
  • [41] A secure and privacy-preserving key agreement and mutual authentication scheme
    Li, Hui
    Jing, Tao
    Qian, Jin
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2020, 34 (04) : 201 - 213
  • [42] An efficient and secure multi-server authentication scheme with key agreement
    Tsaur, Woei-Jiunn
    Li, Jia-Hong
    Lee, Wei-Bin
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (04) : 876 - 882
  • [43] PUF based Secure and Lightweight Authentication and Key-Sharing Scheme for Wireless Sensor Network
    Mahalat, Mahabub Hasan
    Karmakar, Dipankar
    Mondal, Anindan
    Sen, Bibhash
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2022, 18 (01)
  • [44] Secure and Energy Efficient Key Management Scheme using Authentication in cluster based routing protocol
    Kim, Jin-Su
    Joo, Hyung-Seok
    Lee, Jung-Hyun
    Rim, Kee-Wook
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1600 - +
  • [45] Secure distributed key generation for discrete-log based cryptosystems
    Gennaro, Rosario
    Jarecki, Stanislaw
    Krawczyk, Hugo
    Rabin, Tal
    JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 51 - 83
  • [46] Secure and Energy Efficient Key Management Scheme Using Authentication in Cluster Based Routing Protocol
    Kim, Jinsu
    Choi, Seongyong
    Han, Seungjin
    Choi, Junhyeog
    Lee, Junghyun
    Rim, Keewook
    FUTURE GENERATION INFORMATION TECHNOLOGY, PROCEEDINGS, 2009, 5899 : 181 - +
  • [47] Provably secure biometric-based user authentication and key agreement scheme in cloud computing
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4103 - 4119
  • [48] A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems
    Xin Xu
    Ping Zhu
    Qiaoyan Wen
    Zhengping Jin
    Hua Zhang
    Lian He
    Journal of Medical Systems, 2014, 38
  • [49] SSKM: Scalable and Secure Key Management Scheme for Group Signature Based Authentication and CRL in VANET
    Lim, Kiho
    Liu, Weihua
    Wang, Xiwei
    Joung, Jingon
    ELECTRONICS, 2019, 8 (11)
  • [50] A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems
    Xu, Xin
    Zhu, Ping
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    He, Lian
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (01)