完整後設資料紀錄
DC 欄位語言
dc.contributor.authorHwang, Min-Shiang
dc.contributor.authorLi, Li-Mua
dc.contributor.authorLee, Cheng-Chi
dc.date.accessioned2009-06-02T07:22:03Z
dc.date.accessioned2020-05-29T06:16:56Z-
dc.date.available2009-06-02T07:22:03Z
dc.date.available2020-05-29T06:16:56Z-
dc.date.issued2006-11-13T02:58:57Z
dc.date.submitted1999-12-20
dc.identifier.urihttp://dspace.fcu.edu.tw/handle/2377/3189-
dc.description.abstractIn 1996, Horng and Yang had proposed a key authentication scheme that requires no authorities (Computer Communication 19(1996)848-850). However, it is vulnerable to the guessing attack. An intruder can try out a password and forge the public key. To amend this problem, an improved authentication scheme intended to prevent the guessing attack and the forging problem was proposed by Zhan et al. (Computer Communication 22(1999)739-741). However, their scheme did not achieve non-repudiation of public key. In order to achieve non-repudiation of public key, a key authentication scheme for non-repudiation is proposed in this paper. Our scheme will show that the attacker can neither repudiate public key nor forge a public key. The security of our scheme is based on the difficulty of solving the discrete logarithm problem.
dc.description.sponsorship淡江大學, 台北縣
dc.format.extent4p.
dc.format.extent319265 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries1999 NCS會議
dc.subjectPublic key
dc.subjectAuthentication
dc.subjectCertificate
dc.subjectDiscrete logarithm
dc.subjectNon-repudiation
dc.subjectSecurity
dc.subject.otherKey Distributions and Authentication
dc.titleA Key Authentication Scheme for Non-repudiation
分類:1999年 NCS 全國計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics001999000184.pdf311.78 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。