Comment: Cryptanalysis of Lee-Hwang-Li's key authentication scheme

  • Da Zhi Sun*
  • , Zhen Fu Cao
  • , Yu Sun
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

Recently, Zhang and Kim proposed an improved key authentication scheme [Appl. Math. Comput., in press]. Zhang and Kim claimed that the proposed key authentication scheme achieves the non-repudiation service. However, we show that a dishonest user can forge his public key via the verification equation. Hence this scheme cannot achieve the non-repudiation service like the previous variants.

Original languageEnglish
Pages (from-to)675-678
Number of pages4
JournalApplied Mathematics and Computation
Volume164
Issue number3
DOIs
StatePublished - 25 May 2005
Externally publishedYes

Keywords

  • Key authentication
  • Non-repudiation
  • Public key

Fingerprint

Dive into the research topics of 'Comment: Cryptanalysis of Lee-Hwang-Li's key authentication scheme'. Together they form a unique fingerprint.

Cite this