Research note
Key authentication scheme for cryptosystems based on discrete logarithms

https://doi.org/10.1016/S0140-3664(96)01112-7Get rights and content

Abstract

Protecting public keys against intruders is very important in public key cryptosystems. Most key authentication schemes require one or more authorities to authenticate keys. In this paper, we propose a new scheme for cryptosystems based on discrete logarithms. It is similar to the conventional certificate-based schemes, yet it requires no authorities. The certificate of the public key of a user is a combination of his password and private key. Our scheme is highly secure and the authentication process is very simple.

References (9)

  • M. Girault

    Self-certified public keys

  • A. Shamir

    Identity-based cryptosystems and signature schemes

  • J. Simmons

    Contemporary Cryptology: The Science of Information Integrity

  • M. Kohnfelder

    A Method for Certification

    (1978)
There are more references available in the full text version of this article.

Cited by (0)

View full text