Skip to Main Content
Authentication systems for computer virus detection are presented. The systems are based on identity-based signature schemes which can simplify the system management. In the systems a software maker signs software with his own secret key and users verify whether the software is infected with computer virus or not using one public key. Users have only to keep the public key, instead of keys corresponding to each software maker. The key management can therefore be simplified by the use of ID-based authentication systems.
Date of Publication: 19 July 1990