Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications

  title={Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications},
  author={Lein Harn and Jian Ren},
  journal={IEEE Transactions on Wireless Communications},
Public-key digital certificate has been widely used in public-key infrastructure (PKI) to provide user public key authentication. However, the public-key digital certificate itself cannot be used as a security factor to authenticate user. In this paper, we propose the concept of generalized digital certificate (GDC) that can be used to provide user authentication and key agreement. A GDC contains user's public information, such as the information of user's digital driver's license, the… CONTINUE READING
Highly Cited
This paper has 100 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 30 extracted citations

Generating Correlated Digital Certificates: Framework and Applications

IEEE Transactions on Information Forensics and Security • 2016
View 4 Excerpts
Highly Influenced

A Group Authentication Scheme Based on Lagrange Interpolation Polynomial

2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) • 2016
View 1 Excerpt

An efficient group authentication mechanism supporting key confidentiality, key freshness and key authentication in cloud computing

2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC) • 2015
View 1 Excerpt

101 Citations

Citations per Year
Semantic Scholar estimates that this publication has 101 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 27 references

Improved Online/Offline Signature Schemes

View 5 Excerpts
Highly Influenced

Efficient signature generation by smart cards

Journal of Cryptology • 1991
View 4 Excerpts
Highly Influenced

An ef fi cient mobile authentication scheme for wireless networks

Q. Huang, D. Wong, X. Deng

A note on leakage-resilient authenticated key exchange

J. Chun, J. Hwang, D. Lee
IEEE Trans. Wireless Commun., vol. 8, pp. 2274- 2279, May 2009. • 2009
View 1 Excerpt

Design of DL-based certificateless digital signatures

Journal of Systems and Software • 2009
View 2 Excerpts

An Efficient Mobile Authentication Scheme for Wireless Networks

IEEE Transactions on Wireless Communications • 2008
View 1 Excerpt

Generalized Ring Signatures

IEEE Transactions on Dependable and Secure Computing • 2008
View 1 Excerpt