An authentication protocol without trusted third party

Shiuhpyng Shieh*, Wen Her Yang, Hun Min Sun

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

20 Scopus citations

Abstract

A secure authentication protocol which supports both the privacy of messages and the authenticity of communicating parties is proposed. The trusted third party (key information center) is not needed once the secure network system is set up. Mutual authentication and key distribution can be achieved with two messages merely between two parties involved.

Original languageEnglish
Pages (from-to)87-89
Number of pages3
JournalIEEE Communications Letters
Volume1
Issue number3
DOIs
StatePublished - 1 Dec 1997

Keywords

  • Authentication protocol
  • ID-based scheme

Fingerprint Dive into the research topics of 'An authentication protocol without trusted third party'. Together they form a unique fingerprint.

Cite this