Public key authentication schemes in asymmetric cryptography

Abstract In asymmetric cryptography, public key of an authenticated user is accessible to remaining authenticated users in a communication network. Consequently, an ill minded user can avail and modify public key of a legal user. Therefore, it results the problem of public key authentication. There is a scope to explore the ways to secure the public key of an authorized user together with achieving necessary security services. Several key authentication schemes were developed to assure the public key of authorized users. This paper presents the existing key authentication schemes from the instigation of public-key cryptography to till now.

[1]  Kwangjo Kim,et al.  Cryptanalysis of Lee-Hwang-Li's key authentication scheme , 2005, Appl. Math. Comput..

[2]  Z. Li,et al.  On the security of HY-key authentication scheme , 1999, Comput. Commun..

[3]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[4]  Dawei Zhao,et al.  An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments , 2018, PloS one.

[5]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[6]  C. V. Guru Rao,et al.  Cryptanalysis of Zuhua Shao key Authentication Scheme , 2016 .

[7]  Byoungcheon Lee,et al.  Self-certified Signatures , 2002, INDOCRYPT.

[8]  A. Peinado,et al.  Cryptanalysis of LHL-key authentication scheme , 2004, Appl. Math. Comput..

[9]  Cheng-Chi Lee,et al.  A new key authentication scheme based on discrete logarithms , 2003, Appl. Math. Comput..

[10]  Cheng-Chi Lee,et al.  A secure key authentication scheme for cryptosystems based on GDLP and IFP , 2017, Soft Comput..

[11]  Zuhua Shao,et al.  Certificate-based verifiably encrypted RSA signatures , 2015, Trans. Emerg. Telecommun. Technol..

[12]  Gwoboa Horng,et al.  Key authentication scheme for cryptosystems based on discrete logarithms , 1996, Comput. Commun..

[13]  Alberto Peinado Cryptanalysis of a Key Authentication Scheme Based on the Chinese Remainder Theorem and Discrete Logarithms , 2016, SOCO-CISIS-ICEUTE.