Key Authentication Scheme-based on Discrete Logarithms and Chinese Remainder Theorem
Public key cryptosystems are secure only when the authenticity of the public key is assured. Shao proposed a new scheme to overcome the problems of the existing schemes, which suffers from two major drawbacks. The first drawback is the availability of users’ passwords in plaintext format in key serv...
Saved in:
Published in | Defense science journal Vol. 66; no. 6; pp. 590 - 593 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New Delhi
Defence Scientific Information & Documentation Centre
01.11.2016
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!