I'm not sure I see the distinction. Normally authentication works by running the user's input through a hashing function and seeing if it matches the stored hash. How is trying to use the users input as a decryption key, and seeing if it works, any less authenticating?