An authentication protocol without trusted third party

Shiuhpyng Shieh*, Wen Her Yang, Hun Min Sun

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

20 Scopus citations


A secure authentication protocol which supports both the privacy of messages and the authenticity of communicating parties is proposed. The trusted third party (key information center) is not needed once the secure network system is set up. Mutual authentication and key distribution can be achieved with two messages merely between two parties involved.

Original languageEnglish
Pages (from-to)87-89
Number of pages3
JournalIEEE Communications Letters
Issue number3
StatePublished - 1 Dec 1997


  • Authentication protocol
  • ID-based scheme

Fingerprint Dive into the research topics of 'An authentication protocol without trusted third party'. Together they form a unique fingerprint.

Cite this