Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Authentication and protection of public keys
Computers and Security
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
Contemporary Cryptology: The Science of Information Integrity
Contemporary Cryptology: The Science of Information Integrity
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
A new key authentication scheme based on discrete logarithms
Applied Mathematics and Computation
A key authentication scheme with non-repudiation
ACM SIGOPS Operating Systems Review
Research note: On the security of HY-key authentication scheme
Computer Communications
Hi-index | 0.24 |
Protecting public keys against intruders is very important in public key cryptosystems. Most key authentication schemes require one or more authorities to authenticate keys. In this paper, we propose a new scheme for cryptosystems based on discrete logarithms. It is similar to the conventional certificate-based schemes, yet it requires no authorities. The certificate of the public key of a user is a combination of his password and private key. Our scheme is highly secure and the authentication process is very simple.