%0 Journal Article %T Discussion on Different Authentication Mechanisms of PKI and CPK System %A Xianghao Nan %J Open Access Library Journal %V 9 %N 3 %P 1-10 %@ 2333-9721 %D 2022 %I Open Access Library %R 10.4236/oalib.1108460 %X Subject authentication is the core technology of cyber security. There are two existing technologies: one is PKI public key system based on trust logic, another is CPK public key system based on truth logic. In this paper, the different characteristics of trust-based PKI and evidence-based CPK different mechanisms were discussed from Four aspects: decentralized or centralized key generation, trust-based or evidence-based authentication logic, different usages of DSS signature protocol, and functions and performances under different mechanism. Decentralized system has too strong exclusivity, which is easy to be used by criminal groups and gangdoms. Both PKI and CPK can transform DSS signature into digital signature, but there is a serious gap in performance under different logic. Trust logic is the product of the situation that cannot prove subject authenticity. The method of certificate increases the amount of information and the burden of certificate verification. %K PKI %K CPK %K Authentication %K Trust %K Evidence %K Logic %K Cyber %U http://www.oalib.com/paper/6770387