The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not change the fact that the one-and-only Internet still remains open and unprotected. Therefore, for the sake of information security, confirming the legality of an entity’s public key is always critical. Typically, a key authentication scheme needs one or more authorities to authenticate keys. To make a difference, in this study, we have developed a new key authentication scheme using generalized discrete logarithm problem and integer factorization problem for cryptosystems. Although the new scheme works pretty much the same way as regular certificate-based techniques, it differs in that it needs no authority. Taking the password/secret key pair as the certificate of public key for an entity, the new key authentication technique is very simple but profoundly secure.
Public-key cryptosystem Authentication scheme Integer factorization problem (IFP) Certificate-based scheme Generalized discrete logarithm problem (GDLP)
This is a preview of subscription content, log in to check access.
The author would like to thank both anonymous reviewers for their helpful advice. This work was supported by Dr. D.S. Kothari Post-Doctoral fellowship awarded by University Grants Commission, New Delhi, India.
Compliance with ethical standards
Conflict of interest
The authors declare that they have no conflict of interest.
This article does not contain any studies with human participants or animals performed by any of the authors.
Agnew GB, Mullin RC, Vanstone SA (1990) Improved digital signature scheme based on discrete exponentiation. Electron Lett 26:1024–1025CrossRefGoogle Scholar
Chang CC, Chen YH, Lin CC (2009) A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. Soft Comput 13(4):321–331CrossRefGoogle Scholar
Evans A, Kantrowitz W, Weiss E (1974) A user authentication system not requiring secrecy in the computer. Commun ACM 17(8):437–441CrossRefGoogle Scholar
Girault M (1991) Self-certified public keys. Proceedings of EUROCRYPTO 91:490–497MATHGoogle Scholar
He D, Kumar N, Khan MK, Lee JH (2013) Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Trans Consum Electron 59(4):811–817CrossRefGoogle Scholar
He D, Zeadally S, Wu L (2015) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J PP (99):1–10Google Scholar
He D, Kumar N, Shen H, Lee JH (2016a) One-to-many authentication for access control in mobile pay-TV systems. Sci China Inf Sci 59(5):1–14CrossRefMathSciNetGoogle Scholar
He D, Zeadally S, Kumar N, Lee JH (2016b) Anonymous authentication for wireless body area networks with provable security. IEEE Syst J PP (99):1–12Google Scholar
Horng G, Yang CS (1996) Key authentication scheme for cryptosystems based on discrete logarithms. Comput Commun 19:848–850CrossRefGoogle Scholar
Hsieh W, Leu J (2012) Exploiting hash functions to intensify the remote user authentication scheme. Comput Secur 31(6):791–798CrossRefGoogle Scholar
Hu C, Liu P, Zhou Y, Guo S, Wang Y, Xu Q (2015) Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks. Soft Comput 20(12):4914–4932MATHGoogle Scholar
Hu C, Liu P, Guo S (2016) Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs. J Ambient Intell Humaniz Comput 7(5):681–692CrossRefGoogle Scholar
Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wirel Netw 20(8):2481–2501CrossRefGoogle Scholar
Khan MK, Kumari S (2013) An authentication scheme for secure access to healthcare services. J Med Syst 37(4):9954CrossRefGoogle Scholar
Khan MK, Kumari S (2014) Cryptanalysis and improvement of “An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems”. Secur Commun Netw 7(2):399–408CrossRefGoogle Scholar
Kumaraswamy P, Rao CVG, Janaki V, Prashanth KVTKN (2015) A new key authentication scheme for cryptosystems based on discrete logarithms. J Innov Comput Sci Eng 5(1):42–47Google Scholar
Laih CS, Chiou WH, Chang CC (1994) Authentication and protection of public keys. Comput Secur 13:581–585CrossRefGoogle Scholar
Lee WB, Wu YC (2001) A simple and efficient key authentication scheme. In: Proceedings of The 18th workshop on combinational mathematics and computational theory, pp 70–77Google Scholar
Lee CC, Hwang MS, Li LH (2003) A new key authentication scheme based on discrete logarithms. Appl Math Comput 139:343–349MATHMathSciNetGoogle Scholar
Liu CL, Xie K, Miao Y, Zha XF, Feng ZJ, Lee J (2006) Study on the communication method for chaotic encryption in remote monitoring systems. Soft Comput 10(3):224–229CrossRefGoogle Scholar
Liu B, Bi J, Vasilakos AV (2014a) Toward incentivizing anti-spoofing deployment. IEEE Trans Inf Forensics Secur 9(3):436–450CrossRefGoogle Scholar
Liu TH, Wang Q, Zhu HF (2014b) A multi-function password mutual authentication key agreement scheme with privacy preserving. J Inf Hiding Multimedia Signal Process 5(2):165–178Google Scholar
Meshram C, Meshram S (2011) An identity based beta cryptosystem. In: IEEE Proceedings of 7th international conference on information assurance and security (IAS 2011), pp 298–303Google Scholar
Meshram C, Obaidat M (2015) An ID-based quadratic-exponentiation randomized cryptographic scheme. In: IEEE Proceedings of international conference on computer, information, and telecommunication systems (CITS 2015), pp 1–5Google Scholar
Zhou J, Cao Z, Dong X, Xiong N, Vasilakos AV (2015) 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf Sci 314:255–276CrossRefGoogle Scholar