Key authentication scheme for cryptosystems based on discrete logarithms
Identifieur interne : 002658 ( Main/Exploration ); précédent : 002657; suivant : 002659Key authentication scheme for cryptosystems based on discrete logarithms
Auteurs : Gwoboa Horng [République populaire de Chine, Taïwan] ; C. S. Yang [République populaire de Chine]Source :
- Computer Communications [ 0140-3664 ] ; 1995.
Abstract
Protecting public keys against intruders is very important in public key cryptosystems. Most key authentication schemes require one or more authorities to authenticate keys. In this paper, we propose a new scheme for cryptosystems based on discrete logarithms. It is similar to the conventional certificate-based schemes, yet it requires no authorities. The certificate of the public key of a user is a combination of his password and private key. Our scheme is highly secure and the authentication process is very simple.
Url:
DOI: 10.1016/S0140-3664(96)01112-7
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 002706
- to stream Istex, to step Curation: 002524
- to stream Istex, to step Checkpoint: 001A69
- to stream Main, to step Merge: 002802
- to stream Main, to step Curation: 002658
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title>Key authentication scheme for cryptosystems based on discrete logarithms</title>
<author><name sortKey="Horng, Gwoboa" sort="Horng, Gwoboa" uniqKey="Horng G" first="Gwoboa" last="Horng">Gwoboa Horng</name>
</author>
<author><name sortKey="Yang, C S" sort="Yang, C S" uniqKey="Yang C" first="C. S." last="Yang">C. S. Yang</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:B7B2ABB61DD690CE53EE450405A22500D838EB72</idno>
<date when="1996" year="1996">1996</date>
<idno type="doi">10.1016/S0140-3664(96)01112-7</idno>
<idno type="url">https://api.istex.fr/document/B7B2ABB61DD690CE53EE450405A22500D838EB72/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002706</idno>
<idno type="wicri:Area/Istex/Curation">002524</idno>
<idno type="wicri:Area/Istex/Checkpoint">001A69</idno>
<idno type="wicri:doubleKey">0140-3664:1996:Horng G:key:authentication:scheme</idno>
<idno type="wicri:Area/Main/Merge">002802</idno>
<idno type="wicri:Area/Main/Curation">002658</idno>
<idno type="wicri:Area/Main/Exploration">002658</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a">Key authentication scheme for cryptosystems based on discrete logarithms</title>
<author><name sortKey="Horng, Gwoboa" sort="Horng, Gwoboa" uniqKey="Horng G" first="Gwoboa" last="Horng">Gwoboa Horng</name>
<affiliation wicri:level="1"><country xml:lang="fr" wicri:curation="lc">République populaire de Chine</country>
<wicri:regionArea>Institute of Computer Science, National Chung-Hsing University, 250 Kuo-Kuang Road, Taichung 40227, Taiwan</wicri:regionArea>
<wicri:noRegion>Taiwan</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">Taïwan</country>
</affiliation>
</author>
<author><name sortKey="Yang, C S" sort="Yang, C S" uniqKey="Yang C" first="C. S." last="Yang">C. S. Yang</name>
<affiliation wicri:level="1"><country xml:lang="fr" wicri:curation="lc">République populaire de Chine</country>
<wicri:regionArea>Institute of Computer Science, National Chung-Hsing University, 250 Kuo-Kuang Road, Taichung 40227, Taiwan</wicri:regionArea>
<wicri:noRegion>Taiwan</wicri:noRegion>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="j">Computer Communications</title>
<title level="j" type="abbrev">COMCOM</title>
<idno type="ISSN">0140-3664</idno>
<imprint><publisher>ELSEVIER</publisher>
<date type="published" when="1995">1995</date>
<biblScope unit="volume">19</biblScope>
<biblScope unit="issue">9–10</biblScope>
<biblScope unit="page" from="848">848</biblScope>
<biblScope unit="page" to="850">850</biblScope>
</imprint>
<idno type="ISSN">0140-3664</idno>
</series>
<idno type="istex">B7B2ABB61DD690CE53EE450405A22500D838EB72</idno>
<idno type="DOI">10.1016/S0140-3664(96)01112-7</idno>
<idno type="PII">S0140-3664(96)01112-7</idno>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0140-3664</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Protecting public keys against intruders is very important in public key cryptosystems. Most key authentication schemes require one or more authorities to authenticate keys. In this paper, we propose a new scheme for cryptosystems based on discrete logarithms. It is similar to the conventional certificate-based schemes, yet it requires no authorities. The certificate of the public key of a user is a combination of his password and private key. Our scheme is highly secure and the authentication process is very simple.</div>
</front>
</TEI>
<affiliations><list><country><li>République populaire de Chine</li>
<li>Taïwan</li>
</country>
</list>
<tree><country name="République populaire de Chine"><noRegion><name sortKey="Horng, Gwoboa" sort="Horng, Gwoboa" uniqKey="Horng G" first="Gwoboa" last="Horng">Gwoboa Horng</name>
</noRegion>
<name sortKey="Yang, C S" sort="Yang, C S" uniqKey="Yang C" first="C. S." last="Yang">C. S. Yang</name>
</country>
<country name="Taïwan"><noRegion><name sortKey="Horng, Gwoboa" sort="Horng, Gwoboa" uniqKey="Horng G" first="Gwoboa" last="Horng">Gwoboa Horng</name>
</noRegion>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/OcrV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 002658 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 002658 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Ticri/CIDE |area= OcrV1 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:B7B2ABB61DD690CE53EE450405A22500D838EB72 |texte= Key authentication scheme for cryptosystems based on discrete logarithms }}
This area was generated with Dilib version V0.6.32. |