Security of ZLYH-key authentication scheme

Jae-Min Lee, Kee-Won Kim, Eun-Kyung Ryu, Hyung-Mok Lee, K. Yoo
{"title":"Security of ZLYH-key authentication scheme","authors":"Jae-Min Lee, Kee-Won Kim, Eun-Kyung Ryu, Hyung-Mok Lee, K. Yoo","doi":"10.1109/CCST.2003.1297545","DOIUrl":null,"url":null,"abstract":"In public key cryptosystem, it is very important to protect and authenticate a user's public key. In the past, many schemes have been proposed. However, most of the schemes require one or more authorities to authenticate the public key. In the authority-based scheme, since an authority can know user's private keys or generate false certificates, we can impersonate any user at any time. Therefore, it is required such a scheme as an authority cannot know the secret information of users and a security of system does not wholly depend on an authority. In recent years, Zhan et al. proposed a new key authentication scheme, called ZLYH-scheme, which is requires no authority to authenticate a user's public key. However, it still has a weakness that can guess password. We show that ZLYH-scheme has some weakness. To overcome this disadvantage, we propose an improved key authentication scheme. In our scheme, it does not require the secret password table and an attacker cannot guess the password.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2003.1297545","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In public key cryptosystem, it is very important to protect and authenticate a user's public key. In the past, many schemes have been proposed. However, most of the schemes require one or more authorities to authenticate the public key. In the authority-based scheme, since an authority can know user's private keys or generate false certificates, we can impersonate any user at any time. Therefore, it is required such a scheme as an authority cannot know the secret information of users and a security of system does not wholly depend on an authority. In recent years, Zhan et al. proposed a new key authentication scheme, called ZLYH-scheme, which is requires no authority to authenticate a user's public key. However, it still has a weakness that can guess password. We show that ZLYH-scheme has some weakness. To overcome this disadvantage, we propose an improved key authentication scheme. In our scheme, it does not require the secret password table and an attacker cannot guess the password.
ZLYH-key认证方案的安全性
在公钥密码系统中,对用户公钥的保护和认证是非常重要的。在过去,已经提出了许多方案。然而,大多数方案需要一个或多个权威机构来验证公钥。在基于权威的方案中,由于权威机构可以知道用户的私钥或生成虚假证书,因此我们可以在任何时候冒充任何用户。因此,需要这样的方案,因为权威机构不能知道用户的秘密信息,系统的安全性并不完全依赖于权威机构。近年来,Zhan等人提出了一种新的密钥认证方案,称为zlyh方案,该方案不需要授权机构对用户的公钥进行认证。然而,它仍然有一个弱点,可以猜测密码。我们证明了zlyh方案存在一些缺陷。为了克服这一缺点,我们提出了一种改进的密钥认证方案。在我们的方案中,它不需要秘密密码表,攻击者无法猜测密码。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信