<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf19101</article-id><article-id pub-id-type="doi">10.15388/Informatica.2008.198</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>Public Key Authentication Schemes for Local Area Networks</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Chen</surname><given-names>Tzung-Her</given-names></name><email xlink:href="mailto:thchen@mail.ncyu.edu.tw">thchen@mail.ncyu.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Horng</surname><given-names>Gwoboa</given-names></name><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><contrib contrib-type="Author"><name><surname>Yang</surname><given-names>Chuan-Sheng</given-names></name><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><aff id="j_INFORMATICA_aff_000">Department of Computer Science and Information Engineering, National Chiayi University, 300 University Rd., Chia-Yi City, Taiwan 600, R.O.C.</aff><aff id="j_INFORMATICA_aff_001">Institute of Computer Science, National Chung-Hsing University, 250 Kuo-Kuang Road, Taichung, Taiwan 402, R.O.C.</aff></contrib-group><pub-date pub-type="epub"><day>01</day><month>01</month><year>2008</year></pub-date><volume>19</volume><issue>1</issue><fpage>3</fpage><lpage>16</lpage><history><date date-type="received"><day>01</day><month>10</month><year>2006</year></date></history><abstract><p>The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected. Therefore, verifying the legitimacy of an individual's public key is very important. Most of the key authentication schemes require one or more trustworthy authorities to authenticate the key of a user. Consequently, the system security is mainly dependent on the honesty of these third parties. Unfortunately, a security solution in wide area networks (for example, the Internet) often cannot be applied to local area networks directly without any modification. Sometimes, a complete rebuild is necessary, especially for performance criteria consideration. In this paper, we propose two simple key authentication schemes that require no certification authorities for computer systems in local area networks, in which a host is responsible for user authentication and it uses a designated password authentication mechanism.</p></abstract><kwd-group><label>Keywords</label><kwd>security</kwd><kwd>public key cryptosystems</kwd><kwd>authentication</kwd><kwd>key management</kwd><kwd>certificate</kwd><kwd>local area network</kwd></kwd-group></article-meta></front></article>