A new dynamic access control scheme based on subject-object list
Data & Knowledge Engineering
Journal of Network and Computer Applications
Journal of Systems and Software
Adding timestamps to the secure electronic auction protocol
Data & Knowledge Engineering
An ElGamal-Like Cryptosystem for Enciphering Large Messages
IEEE Transactions on Knowledge and Data Engineering
Research note: Key authentication scheme for cryptosystems based on discrete logarithms
Computer Communications
Research note: On the security of HY-key authentication scheme
Computer Communications
Hi-index | 0.00 |
In 1996, Horng and Yang proposed a key authentication scheme that requires no authorities. However, it is vulnerable to the guessing attack. An intruder can try out a password and forge the public key. To amend this problem, an improved authentication scheme intended to prevent the guessing attack and the forging problem was proposed by Zhan et al. in 1999. However, their scheme did not achieve non-repudiation of public key. In order to achieve non-repudiation of public key, two improvements of key authentication scheme for non-repudiation are discussed in this paper.