DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhang, Fangguo | ko |
dc.contributor.author | Kim, Kwangjo | ko |
dc.date.accessioned | 2010-04-21T02:53:36Z | - |
dc.date.available | 2010-04-21T02:53:36Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2005-02 | - |
dc.identifier.citation | APPLIED MATHEMATICS AND COMPUTATION, v.161, pp.101 - 107 | - |
dc.identifier.issn | 0096-3003 | - |
dc.identifier.uri | http://hdl.handle.net/10203/17857 | - |
dc.description.abstract | Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosystems with a trusty server. However, in this paper, we will show that Lee-Hwang-Li's key authentication scheme is not secure, from the obtained public information, any one can get the private key of the user. And then, we propose an improved scheme. We conclude that our new key authentication scheme not only resolves the problems appeared but also is secure. (C) 2003 Elsevier Inc. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.subject | DISCRETE LOGARITHMS | - |
dc.subject | CRYPTOSYSTEMS | - |
dc.subject | CRYPTOGRAPHY | - |
dc.title | Cryptanalysis of Lee-Hwang-Lis key authentication scheme | - |
dc.type | Article | - |
dc.identifier.wosid | 000226559000008 | - |
dc.identifier.scopusid | 2-s2.0-9544251390 | - |
dc.type.rims | ART | - |
dc.citation.volume | 161 | - |
dc.citation.beginningpage | 101 | - |
dc.citation.endingpage | 107 | - |
dc.citation.publicationname | APPLIED MATHEMATICS AND COMPUTATION | - |
dc.identifier.doi | 10.1016/j.amc.2003.12.012 | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Zhang, Fangguo | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | key authentication scheme | - |
dc.subject.keywordAuthor | cryptanalysis | - |
dc.subject.keywordAuthor | certificate | - |
dc.subject.keywordAuthor | password | - |
dc.subject.keywordPlus | DISCRETE LOGARITHMS | - |
dc.subject.keywordPlus | CRYPTOSYSTEMS | - |
dc.subject.keywordPlus | CRYPTOGRAPHY | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.