Integrating Authentication in Public Key Distribution System

We propose a way to integrate the authentication into the key distribution scheme to obtain an authenticated secure session key distribution system. In our scheme, only one randomizer is used and the weaknesses pointed out by Nyberg and Rueppel can be avoided.

[1]  S. Vanstone,et al.  Improved digital signature scheme based on discrete exponentiation , 1990 .

[2]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[3]  Yacov Yacobi,et al.  Exponentiating Faster with Addition Chains , 1991, EUROCRYPT.

[4]  Claus-Peter Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.

[5]  Rainer A. Rueppel,et al.  Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.

[6]  Chin-Chen Chang,et al.  A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm , 1995, J. Inf. Sci. Eng..

[7]  Benjamin Arazi Integrating a key distribution procedure into the digital signature standard , 1993 .

[8]  Che Wun Chiou Parallel implementation of the rsa public-key cryptosystem , 1993 .

[9]  CORPORATE NIST The digital signature standard , 1992, CACM.

[10]  Paul Kahn,et al.  IRIS hypermedia services , 1992, CACM.

[11]  Hideki Imai,et al.  ON SEEKING SMART PUBLIC-KEY-DISTRIBUTION SYSTEMS. , 1986 .

[12]  L. Harn New digital signature scheme based on discrete logarithm , 1994 .

[13]  R. A. Rueppel,et al.  Message recovery for signature schemes based on the discrete logarithm problem , 1994, EUROCRYPT.

[14]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[15]  Rainer A. Rueppel,et al.  Weaknesses in some recent key agreement protocols , 1994 .