Serveur d'exploration sur l'OCR

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Key authentication scheme for cryptosystems based on discrete logarithms

Identifieur interne : 002658 ( Main/Exploration ); précédent : 002657; suivant : 002659

Key authentication scheme for cryptosystems based on discrete logarithms

Auteurs : Gwoboa Horng [République populaire de Chine, Taïwan] ; C. S. Yang [République populaire de Chine]

Source :

RBID : ISTEX:B7B2ABB61DD690CE53EE450405A22500D838EB72

Abstract

Protecting public keys against intruders is very important in public key cryptosystems. Most key authentication schemes require one or more authorities to authenticate keys. In this paper, we propose a new scheme for cryptosystems based on discrete logarithms. It is similar to the conventional certificate-based schemes, yet it requires no authorities. The certificate of the public key of a user is a combination of his password and private key. Our scheme is highly secure and the authentication process is very simple.

Url:
DOI: 10.1016/S0140-3664(96)01112-7


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title>Key authentication scheme for cryptosystems based on discrete logarithms</title>
<author>
<name sortKey="Horng, Gwoboa" sort="Horng, Gwoboa" uniqKey="Horng G" first="Gwoboa" last="Horng">Gwoboa Horng</name>
</author>
<author>
<name sortKey="Yang, C S" sort="Yang, C S" uniqKey="Yang C" first="C. S." last="Yang">C. S. Yang</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:B7B2ABB61DD690CE53EE450405A22500D838EB72</idno>
<date when="1996" year="1996">1996</date>
<idno type="doi">10.1016/S0140-3664(96)01112-7</idno>
<idno type="url">https://api.istex.fr/document/B7B2ABB61DD690CE53EE450405A22500D838EB72/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002706</idno>
<idno type="wicri:Area/Istex/Curation">002524</idno>
<idno type="wicri:Area/Istex/Checkpoint">001A69</idno>
<idno type="wicri:doubleKey">0140-3664:1996:Horng G:key:authentication:scheme</idno>
<idno type="wicri:Area/Main/Merge">002802</idno>
<idno type="wicri:Area/Main/Curation">002658</idno>
<idno type="wicri:Area/Main/Exploration">002658</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a">Key authentication scheme for cryptosystems based on discrete logarithms</title>
<author>
<name sortKey="Horng, Gwoboa" sort="Horng, Gwoboa" uniqKey="Horng G" first="Gwoboa" last="Horng">Gwoboa Horng</name>
<affiliation wicri:level="1">
<country xml:lang="fr" wicri:curation="lc">République populaire de Chine</country>
<wicri:regionArea>Institute of Computer Science, National Chung-Hsing University, 250 Kuo-Kuang Road, Taichung 40227, Taiwan</wicri:regionArea>
<wicri:noRegion>Taiwan</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Taïwan</country>
</affiliation>
</author>
<author>
<name sortKey="Yang, C S" sort="Yang, C S" uniqKey="Yang C" first="C. S." last="Yang">C. S. Yang</name>
<affiliation wicri:level="1">
<country xml:lang="fr" wicri:curation="lc">République populaire de Chine</country>
<wicri:regionArea>Institute of Computer Science, National Chung-Hsing University, 250 Kuo-Kuang Road, Taichung 40227, Taiwan</wicri:regionArea>
<wicri:noRegion>Taiwan</wicri:noRegion>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="j">Computer Communications</title>
<title level="j" type="abbrev">COMCOM</title>
<idno type="ISSN">0140-3664</idno>
<imprint>
<publisher>ELSEVIER</publisher>
<date type="published" when="1995">1995</date>
<biblScope unit="volume">19</biblScope>
<biblScope unit="issue">9–10</biblScope>
<biblScope unit="page" from="848">848</biblScope>
<biblScope unit="page" to="850">850</biblScope>
</imprint>
<idno type="ISSN">0140-3664</idno>
</series>
<idno type="istex">B7B2ABB61DD690CE53EE450405A22500D838EB72</idno>
<idno type="DOI">10.1016/S0140-3664(96)01112-7</idno>
<idno type="PII">S0140-3664(96)01112-7</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0140-3664</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Protecting public keys against intruders is very important in public key cryptosystems. Most key authentication schemes require one or more authorities to authenticate keys. In this paper, we propose a new scheme for cryptosystems based on discrete logarithms. It is similar to the conventional certificate-based schemes, yet it requires no authorities. The certificate of the public key of a user is a combination of his password and private key. Our scheme is highly secure and the authentication process is very simple.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>République populaire de Chine</li>
<li>Taïwan</li>
</country>
</list>
<tree>
<country name="République populaire de Chine">
<noRegion>
<name sortKey="Horng, Gwoboa" sort="Horng, Gwoboa" uniqKey="Horng G" first="Gwoboa" last="Horng">Gwoboa Horng</name>
</noRegion>
<name sortKey="Yang, C S" sort="Yang, C S" uniqKey="Yang C" first="C. S." last="Yang">C. S. Yang</name>
</country>
<country name="Taïwan">
<noRegion>
<name sortKey="Horng, Gwoboa" sort="Horng, Gwoboa" uniqKey="Horng G" first="Gwoboa" last="Horng">Gwoboa Horng</name>
</noRegion>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/OcrV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 002658 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 002658 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    OcrV1
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:B7B2ABB61DD690CE53EE450405A22500D838EB72
   |texte=   Key authentication scheme for cryptosystems based on discrete logarithms
}}

Wicri

This area was generated with Dilib version V0.6.32.
Data generation: Sat Nov 11 16:53:45 2017. Site generation: Mon Mar 11 23:15:16 2024