Research note: Key authentication scheme for cryptosystems based on discrete logarithms
Computer Communications
A new key authentication scheme based on discrete logarithms
Applied Mathematics and Computation
A key authentication scheme with non-repudiation
ACM SIGOPS Operating Systems Review
Hi-index | 0.24 |
It is proved that the HY-key authentication scheme proposed by (Horng and Yang, Computer Communications 19 (1996) 848-850) is vulnerable to the guessing attack (Li et al., IEEE Journal on Selected Areas in Communications 11 (5) (1993)). The user's password is obtained by the guessing attack, and then the user's public key can be forged or the user's private key can be recovered. In order to overcome this disadvantage, we propose a new improved HY-scheme. The attacker cannot recover the user's private key, even though he has obtained the user's password.