Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
9507148 | Applied Mathematics and Computation | 2005 | 4 Pages |
Abstract
Recently, Zhang and Kim proposed an improved key authentication scheme [Appl. Math. Comput., in press]. Zhang and Kim claimed that the proposed key authentication scheme achieves the non-repudiation service. However, we show that a dishonest user can forge his public key via the verification equation. Hence this scheme cannot achieve the non-repudiation service like the previous variants.
Related Topics
Physical Sciences and Engineering
Mathematics
Applied Mathematics
Authors
Da-Zhi Sun, Zhen-Fu Cao, Yu Sun,