Public key authentication schemes for local area networks

被引:0
作者
Chen, Tzung-Her [1 ]
Horng, Gwobot [2 ]
Yang, Chuan-Sheng [2 ]
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi 600, Taiwan
[2] Natl Chung Hsing Univ, Inst Comp Sci, Taichung 402, Taiwan
关键词
security; public key cryptosystems; authentication; key management; certificate; local area network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected. Therefore, verifying the legitimacy of an individual's public key is very important. Most of the key authentication schemes require one or more trustworthy authorities to authenticate the key of a user. Consequently, the system security is mainly dependent on the honesty of these third parties. Unfortunately, a security solution in wide area networks (for example, the Internet) often cannot be applied to local area networks directly without any modification. Sometimes, a complete rebuild is necessary, especially for performance criteria consideration. In this paper, we propose two simple key authentication schemes that require no certification authorities for computer systems in local area networks, in which a host is responsible for user authentication and it uses a designated password authentication mechanism.
引用
收藏
页码:3 / 16
页数:14
相关论文
共 50 条
[41]   A New Attack Method Against ECG-Based Key Generation and Agreement Schemes in Body Area Networks [J].
Hodgkiss, Jack ;
Djahel, Soufiene ;
Zhang, Zonghua .
IEEE SENSORS JOURNAL, 2021, 21 (15) :17300-17307
[42]   Classification of Key Management Schemes for Wireless Sensor Networks [J].
Lee, Hwaseong ;
Kim, Yong Ho ;
Lee, Dong Hoon ;
Lim, Jongin .
ADVANCES IN WEB AND NETWORK TECHNOLOGIES, AND INFORMATION MANAGEMENT, PROCEEDINGS, 2007, 4537 :664-673
[43]   Key management schemes in wireless sensor networks: A survey [J].
1600, IEEE Computer Society :813-820
[44]   Key Management Schemes in Wireless Sensor Networks: A Survey [J].
Reegan, A. Selva ;
Baburaj, E. .
PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013), 2013, :813-820
[45]   A Novel Authentication and Key Agreement Scheme for In-Vehicle Networks [J].
Lai, Chengzhe ;
Ma, Jiping ;
Wang, Xinwei ;
Zhou, Haibo ;
Zheng, Dong .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2025, 74 (06) :9630-9644
[46]   A novel re-authentication scheme based on tickets in wireless local area networks [J].
Li, Guangsong ;
Ma, Jianfeng ;
Jiang, Qi ;
Chen, Xi .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2011, 71 (07) :906-914
[47]   Universal Forgery Attacks on Remote Authentication Schemes for Wireless Body Area Networks Based on Internet of Things [J].
Shim, Kyung-Ah .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :9211-9212
[48]   Public key authentication scheme over quaternions [J].
Valluri, Maheswara Rao ;
Narayan, Shailendra Vikash .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (01) :169-181
[49]   Password authentication without the server public key [J].
Chang, YF ;
Chang, CC ;
Liu, YL .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (10) :3088-3091
[50]   Parallel authentication and public-key encryption [J].
Pieprzyk, J ;
Pointcheval, D .
INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 :387-401