Item Details
Skip Navigation Links
   ActiveUsers:409Hits:20428569Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

In Basket
  Journal Article   Journal Article
 

ID149002
Title ProperKey authentication scheme-based on discrete logarithms and Chinese remainder theorem
LanguageENG
AuthorP. Kumaraswamy, C.V. Guru Rao, V. Janaki, K.V.T.K.N. Prashanth ;  P. Kumaraswamy, ;  Prashanth, K.V.T.K.N. ;  Janaki, V ;  Rao, C V Guru
Summary / Abstract (Note)Public key cryptosystems are secure only when the authenticity of the public key is assured. Shao proposed
a new scheme to overcome the problems of the existing schemes, which suffers from two major drawbacks. The
first drawback is the availability of users’ passwords in plaintext format in key server which are prone to attacks
by ill-minded users. The second one is depending on the key server blindly for certificate generation, without
further verification by the user. To overcome these severe drawbacks, we proposed an improved key authentication
scheme based on Chinese remainder theorem and discrete logarithms. Our scheme allows the user to generate his/
her certificate without the help of any trusted third party. This scheme is intended for online services, military and
defense applications to exchange keys securely.
`In' analytical NoteDefence Science Journal Vol. 66, No.6; Nov 2016: p.590-593
Journal SourceDefence Science Journal 2016-12 66, 6
Key WordsCertificate ;  Authentication ;  Chinese Remainder Theorem ;  Discrete Logarithms ;  Confidentiality ;  Non-Repudiation ;  Public Key Cryptosystem