{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,22]],"date-time":"2023-10-22T20:45:16Z","timestamp":1698007516979},"reference-count":19,"publisher":"Wiley","issue":"10","license":[{"start":{"date-parts":[[2007,3,21]],"date-time":"2007-03-21T00:00:00Z","timestamp":1174435200000},"content-version":"vor","delay-in-days":7384,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Systems &amp;amp; Computers in Japan"],"published-print":{"date-parts":[[1987,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This paper proposes a new user authentication scheme, which does not require a management file for users' passwords. It has a high security, realizing the authentication of a large number of users by a single public key. Because of this property, the proposed system has merits in the application to off\u2010line and mutual authentication. The scheme is also useful in the authentication in a large system with a large number of users. The system is constructed using the public\u2010key digital signature and a oneway function with the commutative property. An example is presented where RSA is employed as the digital signature and the congruent exponential function is employed as the one\u2010way function. It is described that the security of the proposed system appears to be equivalent to that of RSA or the digital signature based on RSA. Following the same idea, a digital signature system is proposed, where the authentication of a large number of users can be performed by a single public\u2010key. A variation of the scheme is presented which has the same performance as the proposed scheme.<\/jats:p>","DOI":"10.1002\/scj.4690181002","type":"journal-article","created":{"date-parts":[[2007,7,7]],"date-time":"2007-07-07T13:03:05Z","timestamp":1183813385000},"page":"14-24","source":"Crossref","is-referenced-by-count":4,"title":["A single public\u2010key authentication scheme for multiple users"],"prefix":"10.1002","volume":"18","author":[{"given":"Tatsuaki","family":"Okamoto","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,3,21]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/361082.361087"},{"key":"e_1_2_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"e_1_2_1_4_2","article-title":"A proposal for password authentication","volume":"8","author":"Okamoto T.","year":"1983","journal-title":"Nat. Conv. Inf. Systems, I. E. C. E., Japan"},{"key":"e_1_2_1_5_2","first-page":"582","volume-title":"Lecture Notes Comput. Sci.","author":"Shamir A.","year":"1980"},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1981.1095067"},{"key":"e_1_2_1_8_2","first-page":"283","volume-title":"Lecture Notes Comp. Sci.","author":"Davio M.","year":"1983"},{"key":"e_1_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_1_11_2","first-page":"55","volume-title":"Applying the RSA digital signature to electric mail","author":"Davies D. W.","year":"1983"},{"key":"e_1_2_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/358027.358052"},{"key":"e_1_2_1_13_2","volume-title":"Computers and Intractability\u2014a Guide to the Theory of NP\u2010Completeness","author":"Garey M. R.","year":"1979"},{"issue":"6","key":"e_1_2_1_14_2","first-page":"547","article-title":"Cryptographic algorithm and theory of computation","volume":"25","author":"Kasami T.","year":"1984","journal-title":"Inf. Proc."},{"key":"e_1_2_1_15_2","volume-title":"The Art of Computer Programming, 2","author":"Knuth D.","year":"1981"},{"key":"e_1_2_1_16_2","doi-asserted-by":"crossref","unstructured":"A.Shamir.On the generation of cryptographically strong pseudo\u2010random sequences 8th ICALP pp.545\u2013550(1981).","DOI":"10.1007\/3-540-10843-2_43"},{"key":"e_1_2_1_17_2","article-title":"Application of time\u2010stamp to user authentication using public key cryptography","volume":"1470","author":"Okamoto T.","year":"1984","journal-title":"Nat. Conv. I. E. C. E., Japan"},{"key":"e_1_2_1_18_2","volume-title":"Theory of Integers","author":"Inaba E.","year":"1956"},{"key":"e_1_2_1_19_2","article-title":"A secure user authentication without password files","volume":"83","author":"Okamoto T.","year":"1984","journal-title":"Tech. Rep. I. E. C. E., Japan"},{"key":"e_1_2_1_20_2","article-title":"Multiuser authentication scheme with single public key","volume":"84","author":"Okamoto T.","year":"1985","journal-title":"Tech. Rep. I. E. C. E., Japan"}],"container-title":["Systems and Computers in Japan"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fscj.4690181002","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/scj.4690181002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T03:47:15Z","timestamp":1697860035000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/scj.4690181002"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1987,1]]},"references-count":19,"journal-issue":{"issue":"10","published-print":{"date-parts":[[1987,1]]}},"alternative-id":["10.1002\/scj.4690181002"],"URL":"https:\/\/doi.org\/10.1002\/scj.4690181002","archive":["Portico"],"relation":{},"ISSN":["0882-1666","1520-684X"],"issn-type":[{"value":"0882-1666","type":"print"},{"value":"1520-684X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1987,1]]}}}