Im et al., 2016 - Google Patents
Password Authentication Using One-Time Key-Based Signature and Homomorphic EncryptionIm et al., 2016
- Document ID
- 13801782128386111638
- Author
- Im J
- Lee M
- Publication year
- Publication venue
- International Conference on Broadband and Wireless Computing, Communication and Applications
External Links
Snippet
User authentication is a process for a system to verify the identity of a claimed user and to give access permission. Although there are many other authentication methods such as biometrics and physical tokens, passwords are still being used in many applications due to …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10211981B2 (en) | System and method for generating a server-assisted strong password from a weak secret | |
| Chen et al. | Security enhancement on an improvement on two remote user authentication schemes using smart cards | |
| JP4833489B2 (en) | System, method and software for remote password authentication using multiple servers | |
| Das | A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications | |
| CN110971411A (en) | A SM2 homomorphic signature method based on SOTP technology to multiply and encrypt private keys | |
| Wen et al. | A robust smart card‒based anonymous user authentication protocol for wireless communications | |
| Chen et al. | An efficient nonce-based authentication scheme with key agreement | |
| Song et al. | Hardening password-based credential databases | |
| Huszti et al. | A simple authentication scheme for clouds | |
| CN106230840B (en) | A kind of command identifying method of high security | |
| Abusukhon et al. | An authenticated, secure, and mutable multiple‐session‐keys protocol based on elliptic curve cryptography and text‐to‐image encryption algorithm | |
| Schwab et al. | Entity authentication in a mobile-cloud environment | |
| Zhang et al. | A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP | |
| Yi et al. | An Improved Data Backup Scheme Based on Multi-Factor Authentication | |
| Dowlatshah et al. | A secure and robust smart card-based remote user authentication scheme | |
| Chang et al. | Novel untraceable authenticated key agreement protocol suitable for mobile communication | |
| Daddala et al. | Design and implementation of a customized encryption algorithm for authentication and secure communication between devices | |
| İşler et al. | Distributed single password protocol framework | |
| ul Haq et al. | An efficient authenticated key agreement scheme for consumer USB MSDs resilient to unauthorized file decryption | |
| Mandal et al. | Comprehensive and improved secure biometric system using homomorphic encryption | |
| Guo et al. | A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC. | |
| Mehta et al. | Group authentication using paillier threshold cryptography | |
| Mishra et al. | An improved biometric–based remote user authentication scheme for connected healthcare | |
| Ye et al. | Secure marine environment communication: A multiobject authentication protocol based on secret sharing | |
| Mishra et al. | Authenticated content distribution framework for digital rights management systems with smart card revocation |