[go: up one dir, main page]

Im et al., 2016 - Google Patents

Password Authentication Using One-Time Key-Based Signature and Homomorphic Encryption

Im et al., 2016

Document ID
13801782128386111638
Author
Im J
Lee M
Publication year
Publication venue
International Conference on Broadband and Wireless Computing, Communication and Applications

External Links

Snippet

User authentication is a process for a system to verify the identity of a claimed user and to give access permission. Although there are many other authentication methods such as biometrics and physical tokens, passwords are still being used in many applications due to …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Similar Documents

Publication Publication Date Title
US10211981B2 (en) System and method for generating a server-assisted strong password from a weak secret
Chen et al. Security enhancement on an improvement on two remote user authentication schemes using smart cards
JP4833489B2 (en) System, method and software for remote password authentication using multiple servers
Das A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications
CN110971411A (en) A SM2 homomorphic signature method based on SOTP technology to multiply and encrypt private keys
Wen et al. A robust smart card‒based anonymous user authentication protocol for wireless communications
Chen et al. An efficient nonce-based authentication scheme with key agreement
Song et al. Hardening password-based credential databases
Huszti et al. A simple authentication scheme for clouds
CN106230840B (en) A kind of command identifying method of high security
Abusukhon et al. An authenticated, secure, and mutable multiple‐session‐keys protocol based on elliptic curve cryptography and text‐to‐image encryption algorithm
Schwab et al. Entity authentication in a mobile-cloud environment
Zhang et al. A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP
Yi et al. An Improved Data Backup Scheme Based on Multi-Factor Authentication
Dowlatshah et al. A secure and robust smart card-based remote user authentication scheme
Chang et al. Novel untraceable authenticated key agreement protocol suitable for mobile communication
Daddala et al. Design and implementation of a customized encryption algorithm for authentication and secure communication between devices
İşler et al. Distributed single password protocol framework
ul Haq et al. An efficient authenticated key agreement scheme for consumer USB MSDs resilient to unauthorized file decryption
Mandal et al. Comprehensive and improved secure biometric system using homomorphic encryption
Guo et al. A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC.
Mehta et al. Group authentication using paillier threshold cryptography
Mishra et al. An improved biometric–based remote user authentication scheme for connected healthcare
Ye et al. Secure marine environment communication: A multiobject authentication protocol based on secret sharing
Mishra et al. Authenticated content distribution framework for digital rights management systems with smart card revocation