Soft Computing

, Volume 21, Issue 24, pp 7285–7291 | Cite as

A secure key authentication scheme for cryptosystems based on GDLP and IFP

  • Chandrashekhar Meshram
  • Cheng-Chi LeeEmail author
  • Chun-Ta Li
  • Chin-Ling Chen


The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not change the fact that the one-and-only Internet still remains open and unprotected. Therefore, for the sake of information security, confirming the legality of an entity’s public key is always critical. Typically, a key authentication scheme needs one or more authorities to authenticate keys. To make a difference, in this study, we have developed a new key authentication scheme using generalized discrete logarithm problem and integer factorization problem for cryptosystems. Although the new scheme works pretty much the same way as regular certificate-based techniques, it differs in that it needs no authority. Taking the password/secret key pair as the certificate of public key for an entity, the new key authentication technique is very simple but profoundly secure.


Public-key cryptosystem Authentication scheme Integer factorization problem (IFP) Certificate-based scheme Generalized discrete logarithm problem (GDLP) 



The author would like to thank both anonymous reviewers for their helpful advice. This work was supported by Dr. D.S. Kothari Post-Doctoral fellowship awarded by University Grants Commission, New Delhi, India.

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.


  1. Agnew GB, Mullin RC, Vanstone SA (1990) Improved digital signature scheme based on discrete exponentiation. Electron Lett 26:1024–1025CrossRefGoogle Scholar
  2. Chang CC, Chen YH, Lin CC (2009) A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. Soft Comput 13(4):321–331CrossRefGoogle Scholar
  3. Diffie D, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654CrossRefzbMATHMathSciNetGoogle Scholar
  4. Evans A, Kantrowitz W, Weiss E (1974) A user authentication system not requiring secrecy in the computer. Commun ACM 17(8):437–441CrossRefGoogle Scholar
  5. Girault M (1991) Self-certified public keys. Proceedings of EUROCRYPTO 91:490–497zbMATHGoogle Scholar
  6. He D, Kumar N, Khan MK, Lee JH (2013) Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Trans Consum Electron 59(4):811–817CrossRefGoogle Scholar
  7. He D, Zeadally S, Wu L (2015) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J PP (99):1–10Google Scholar
  8. He D, Kumar N, Shen H, Lee JH (2016a) One-to-many authentication for access control in mobile pay-TV systems. Sci China Inf Sci 59(5):1–14CrossRefMathSciNetGoogle Scholar
  9. He D, Zeadally S, Kumar N, Lee JH (2016b) Anonymous authentication for wireless body area networks with provable security. IEEE Syst J PP (99):1–12Google Scholar
  10. Horng G, Yang CS (1996) Key authentication scheme for cryptosystems based on discrete logarithms. Comput Commun 19:848–850CrossRefGoogle Scholar
  11. Hsieh W, Leu J (2012) Exploiting hash functions to intensify the remote user authentication scheme. Comput Secur 31(6):791–798CrossRefGoogle Scholar
  12. Hu C, Liu P, Zhou Y, Guo S, Wang Y, Xu Q (2015) Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks. Soft Comput 20(12):4914–4932zbMATHGoogle Scholar
  13. Hu C, Liu P, Guo S (2016) Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs. J Ambient Intell Humaniz Comput 7(5):681–692CrossRefGoogle Scholar
  14. Hwang MS, Lee CC, Tzeng SF (2013) A new proxy signature scheme for a specified group of verifiers. Inf Sci 227(1):102–115CrossRefzbMATHMathSciNetGoogle Scholar
  15. Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wirel Netw 20(8):2481–2501CrossRefGoogle Scholar
  16. Khan MK, Kumari S (2013) An authentication scheme for secure access to healthcare services. J Med Syst 37(4):9954CrossRefGoogle Scholar
  17. Khan MK, Kumari S (2014) Cryptanalysis and improvement of “An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems”. Secur Commun Netw 7(2):399–408CrossRefGoogle Scholar
  18. Kumaraswamy P, Rao CVG, Janaki V, Prashanth KVTKN (2015) A new key authentication scheme for cryptosystems based on discrete logarithms. J Innov Comput Sci Eng 5(1):42–47Google Scholar
  19. Laih CS, Chiou WH, Chang CC (1994) Authentication and protection of public keys. Comput Secur 13:581–585CrossRefGoogle Scholar
  20. Lee WB, Wu YC (2001) A simple and efficient key authentication scheme. In: Proceedings of The 18th workshop on combinational mathematics and computational theory, pp 70–77Google Scholar
  21. Lee CC, Hwang MS, Li LH (2003) A new key authentication scheme based on discrete logarithms. Appl Math Comput 139:343–349zbMATHMathSciNetGoogle Scholar
  22. Liu CL, Xie K, Miao Y, Zha XF, Feng ZJ, Lee J (2006) Study on the communication method for chaotic encryption in remote monitoring systems. Soft Comput 10(3):224–229CrossRefGoogle Scholar
  23. Liu B, Bi J, Vasilakos AV (2014a) Toward incentivizing anti-spoofing deployment. IEEE Trans Inf Forensics Secur 9(3):436–450CrossRefGoogle Scholar
  24. Liu TH, Wang Q, Zhu HF (2014b) A multi-function password mutual authentication key agreement scheme with privacy preserving. J Inf Hiding Multimedia Signal Process 5(2):165–178Google Scholar
  25. Meshram C, Meshram S (2011) An identity based beta cryptosystem. In: IEEE Proceedings of 7th international conference on information assurance and security (IAS 2011), pp 298–303Google Scholar
  26. Meshram C, Obaidat M (2015) An ID-based quadratic-exponentiation randomized cryptographic scheme. In: IEEE Proceedings of international conference on computer, information, and telecommunication systems (CITS 2015), pp 1–5Google Scholar
  27. Meshram C, Powar PL (2016) An efficient identity-based QER cryptographic scheme. Complex Intell Syst. 1–7: doi: 10.1007/s40747-016-0030-8
  28. Meshram C, Meshram S, Gupta D (2012a) An ID-based beta cryptosystem using generalized discrete logarithm problem and integer factorization problem. J Inf Assur Secur 7(4):275–283Google Scholar
  29. Meshram C, Meshram S, Zhang M (2012b) An ID-based cryptographic mechanisms based on GDLP and IFP. Inf Process Lett 112(19):753–758CrossRefzbMATHMathSciNetGoogle Scholar
  30. Peinado A (2004) Cryptanalysis of LHL-key authentication scheme. Appl Math Comput 152:721–724zbMATHMathSciNetGoogle Scholar
  31. Shamir A (1985) Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTG, vol 84, pp 47–53Google Scholar
  32. Wang T, Liu Y, Vasilakos AV (2015) Survey on channel reciprocity based key establishment techniques for wireless systems. Wirel Netw 21(6):1835–1846CrossRefGoogle Scholar
  33. Wei L, Zhu H, Cao Z, Dong X, Jia W, Chen Y, Vasilakos AV (2014) Security and privacy for storage and computation in cloud computing. Inf Sci 258:371–386CrossRefGoogle Scholar
  34. Wu TS, Lin HY (2004) Robust key authentication scheme resistant to public key substitution attacks. Appl Math Comput 157:825–833zbMATHMathSciNetGoogle Scholar
  35. Yang FY, Lo JH, Liao CM (2013) Improving an efficient ID-based RSA multisignature. J Ambient Intell Humaniz Comput 4(2):249–254CrossRefGoogle Scholar
  36. Yang H, Zhang Y, Zhou Y, Fu X, Liu H, Vasilakos AV (2014) Provably secure three-party authenticated key agreement protocol using smart cards. Comput Netw 58:29–38CrossRefGoogle Scholar
  37. Yao G, Bi J, Vasilakos AV (2015) Passive IP traceback: disclosing the locations of IP spoofers from path backscatter. IEEE Trans Inf Forensics Secur 10(3):471–484CrossRefGoogle Scholar
  38. Zhan B, Li Z, Yang Y, Hu Z (1999) On the security of HY-key authentication scheme. Comput Commun 22:739–741CrossRefGoogle Scholar
  39. Zhang F, Kim K (2005) Cryptanalysis of Lee-Hwang-Li’s key authentication scheme. Appl Math Comput 161:101–107zbMATHMathSciNetGoogle Scholar
  40. Zhou J, Cao Z, Dong X, Xiong N, Vasilakos AV (2015) 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf Sci 314:255–276CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2016

Authors and Affiliations

  • Chandrashekhar Meshram
    • 1
    • 2
  • Cheng-Chi Lee
    • 3
    • 4
    Email author
  • Chun-Ta Li
    • 5
  • Chin-Ling Chen
    • 6
  1. 1.Department of Mathematics and Computer ScienceRani Durgavati UniversityJabalpurIndia
  2. 2.Department of MathematicsRTM Nagpur UniversityNagpurIndia
  3. 3.Department of Library and Information ScienceFu Jen Catholic UniversityNew TaipeiTaiwan, ROC
  4. 4.Department of Photonics and Communication EngineeringAsia UniversityWufeng Shiang, TaichungTaiwan, ROC
  5. 5.Department of Information ManagementTainan University of TechnologyTainanTaiwan, ROC
  6. 6.Department of Computer Science and Information EngineeringChaoyang University of TechnologyTaichungTaiwan, ROC

Personalised recommendations