Empirical Study of a Key Authentication Scheme in Public Key Cryptography

Kumaraswamy Palleboina
2017 International Journal of Engineering Research and Applications  
Public key cryptosystem plays major role in many online business applications. In public key cryptosystem, public key need not be protected for confidentiality, but the authenticity of public key is needed. Earlier, many key authentication schemes are developed based on discrete logarithms. Each scheme has its own drawbacks. We developed a secure key authentication scheme based on discrete logarithms to avoid the drawbacks of earlier schemes. In this paper, we illustrate the empirical study to
more » ... empirical study to show the experimental proof of our scheme.
doi:10.9790/9622-0703027986 fatcat:yo5q6xhw5naojmb57fxyuj7bya