Title
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem
Abstract
Public key cryptosystems more recently developed have to be strong against newer and more advanced forms of attacks. The security protection of a public key cryptosystem relies heavily on the design of the public key. The key authentication procedure is one of the easiest and most advantageous authentication mechanisms used over insecure networks and widely applied for the remote login with various operation systems, computer networks, wireless networks, database management systems, and many others. In a typical key authentication procedure, however, there is at least one authority involved to authenticate the keys. In this paper, we shall propose a new key authentication procedure built on the basis of the decisional composite residuosity assumption. As with ordinary certificate-based procedures, the proposed procedure involves no authorities. With the certificate of the public key of a client being a blend of his/her private key and password, the proposed procedure is exceptionally secure, and the authentication process is very simple.
Year
DOI
Venue
2020
10.1007/s00500-020-04768-0
Soft Computing
Keywords
DocType
Volume
Public key cryptosystem, Authentication procedure, Decisional composite residuosity assumption, Certificate-based procedure
Journal
24
Issue
ISSN
Citations 
9
1432-7643
2
PageRank 
References 
Authors
0.36
0
4
Name
Order
Citations
PageRank
Chandrashekhar Meshram1567.23
Mohammad S. Obaidat29917.27
Cheng-Chi Lee31215.49
Sarita Gajbhiye Meshram4355.50