Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A design principle for hash functions
CRYPTO '89 Proceedings on Advances in cryptology
One way hash functions and DES
CRYPTO '89 Proceedings on Advances in cryptology
A new dynamic access control scheme based on subject-object list
Data & Knowledge Engineering
A Non-interactive Public-Key Distribution System
Designs, Codes and Cryptography
A high security log-in procedure
Communications of the ACM
Contemporary Cryptology: The Science of Information Integrity
Contemporary Cryptology: The Science of Information Integrity
Research note: Key authentication scheme for cryptosystems based on discrete logarithms
Computer Communications
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Research note: On the security of HY-key authentication scheme
Computer Communications
Research note: Cryptanalysis of a remote login authentication scheme
Computer Communications
Enhanced of key agreement protocols resistant to a denial-of-service attack
Fundamenta Informaticae
Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack
Fundamenta Informaticae
Hi-index | 0.48 |
In this article, we propose a new public key authentication scheme for cryptosystems with a trusty server. The scheme is based on discrete logarithms. In the scheme, the certificate of the public key is a combination of user's password and private key. The scheme not only resolve the problems appeared but also is secure for the others public-key authentication.