Jae-Min Lee, Kee-Won Kim, Eun-Kyung Ryu, Hyung-Mok Lee, K. Yoo
{"title":"Security of ZLYH-key authentication scheme","authors":"Jae-Min Lee, Kee-Won Kim, Eun-Kyung Ryu, Hyung-Mok Lee, K. Yoo","doi":"10.1109/CCST.2003.1297545","DOIUrl":null,"url":null,"abstract":"In public key cryptosystem, it is very important to protect and authenticate a user's public key. In the past, many schemes have been proposed. However, most of the schemes require one or more authorities to authenticate the public key. In the authority-based scheme, since an authority can know user's private keys or generate false certificates, we can impersonate any user at any time. Therefore, it is required such a scheme as an authority cannot know the secret information of users and a security of system does not wholly depend on an authority. In recent years, Zhan et al. proposed a new key authentication scheme, called ZLYH-scheme, which is requires no authority to authenticate a user's public key. However, it still has a weakness that can guess password. We show that ZLYH-scheme has some weakness. To overcome this disadvantage, we propose an improved key authentication scheme. In our scheme, it does not require the secret password table and an attacker cannot guess the password.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2003.1297545","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In public key cryptosystem, it is very important to protect and authenticate a user's public key. In the past, many schemes have been proposed. However, most of the schemes require one or more authorities to authenticate the public key. In the authority-based scheme, since an authority can know user's private keys or generate false certificates, we can impersonate any user at any time. Therefore, it is required such a scheme as an authority cannot know the secret information of users and a security of system does not wholly depend on an authority. In recent years, Zhan et al. proposed a new key authentication scheme, called ZLYH-scheme, which is requires no authority to authenticate a user's public key. However, it still has a weakness that can guess password. We show that ZLYH-scheme has some weakness. To overcome this disadvantage, we propose an improved key authentication scheme. In our scheme, it does not require the secret password table and an attacker cannot guess the password.