Key Authentication Scheme-based on Discrete Logarithms and Chinese Remainder Theorem

Public key cryptosystems are secure only when the authenticity of the public key is assured. Shao proposed a new scheme to overcome the problems of the existing schemes, which suffers from two major drawbacks. The first drawback is the availability of users’ passwords in plaintext format in key serv...

Full description

Saved in:
Bibliographic Details
Published inDefense science journal Vol. 66; no. 6; pp. 590 - 593
Main Authors Kumaraswamy, P., Rao, C.V. Guru, Janaki, V., Prashanth, K.V.T.K.N.
Format Journal Article
LanguageEnglish
Published New Delhi Defence Scientific Information & Documentation Centre 01.11.2016
Subjects
Online AccessGet full text

Cover

Loading…