透過您的圖書館登入
IP:3.145.152.242

並列摘要


Key authentication is very important in secret communications and data security. Lee et al. proposed a new public key authentication scheme for cryptosystems based on discrete logarithms in 2003. Recently, Zhang et al. pointed out that Lee et al.'s scheme was not secure and proposed an improvement on it. However, in this paper, we will demonstrate that a dishonest user can forge the public key via the verification equation in the improved scheme. Therefore, Zhang et al.'s scheme does not achieve non-repudiation of the user's public key.

被引用紀錄


游佩珊(2014)。應用於無線感測節點之單體太陽能能源擷取升壓轉換器〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201400424
Tzeng, W. J. (2009). 一個相容於IPv6的P2P即時影音串流傳輸平台之研製 [master's thesis, National Tsing Hua University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0016-1111200916112398
Tsai, P. Y. (2014). 以GPU加速Adaboost為基底之多物件辨識系統 [master's thesis, National Tsing Hua University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0016-3103201511193212

延伸閱讀