On the Authentication of Certificateless RSA Public Key

2018 
Public key certifications are formal and secure in user authentication. The infrastructure of certificate authorities (CA) is necessary in public key certifications. In many secure and non-restrictive applications, such as authentication in the secure wireless access points (AP), the password authentication is not secure enough, and the cost of public key certification is too high. In this article, we focus on the certificateless RSA public key authentication: the technology, limitation, content, and security of the predetermined portion in RSA public key. In order to authenticate RSA public key, we can predetermine portion in RSA key generation by using multiplication properties, multiplicative inverse with suitable authenticated content. In comparison with traditional RSA, the key generation must be modified. On the other side, the encryption, decryption, signature generation and verification are all the same in comparison with traditional RSA cryptosystem that is secure and convenient to many applications.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    11
    References
    0
    Citations
    NaN
    KQI
    []