A software authentication system for information integrity.

Lein Harn,Hung-Yu Lin,Shoubao Yang
DOI: https://doi.org/10.1016/0167-4048(92)90130-J
1992-01-01
Abstract:This paper describes a software authentication technique based on the public key cryptography for information integrity. The software provider can use a secret key to sign any released program and the user can verify the integrity of programs obtained from vendors or a ''trusted information database''. The software provider needs to go through a registration process to become ''licensed'' and obtains certificates from multiple certificate centers before being able to sign any released program. Users need only one public key to verify the integrity of the programs.
What problem does this paper attempt to address?