Open Access Library Journal

Volume 9, Issue 3 (March 2022)

ISSN Print: 2333-9705   ISSN Online: 2333-9721

Google-based Impact Factor: 0.73  Citations  

Discussion on Different Authentication Mechanisms of PKI and CPK System

HTML  XML Download Download as PDF (Size: 264KB)  PP. 1-10  
DOI: 10.4236/oalib.1108460    63 Downloads   464 Views  
Author(s)

ABSTRACT

Subject authentication is the core technology of cyber security. There are two existing technologies: one is PKI public key system based on trust logic, another is CPK public key system based on truth logic. In this paper, the different characteristics of trust-based PKI and evidence-based CPK different mechanisms were discussed from Four aspects: decentralized or centralized key generation, trust-based or evidence-based authentication logic, different usages of DSS signature protocol, and functions and performances under different mechanism. Decentralized system has too strong exclusivity, which is easy to be used by criminal groups and gangdoms. Both PKI and CPK can transform DSS signature into digital signature, but there is a serious gap in performance under different logic. Trust logic is the product of the situation that cannot prove subject authenticity. The method of certificate increases the amount of information and the burden of certificate verification.

Share and Cite:

Nan, X.H. (2022) Discussion on Different Authentication Mechanisms of PKI and CPK System. Open Access Library Journal, 9, 1-10. doi: 10.4236/oalib.1108460.

Cited by

No relevant information.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.