14,150 Hits in 6.2 sec

Multidevice Authentication with Strong Privacy Protection

Jan Hajny, Petr Dzurenda, Lukas Malina
2018 Wireless Communications and Mobile Computing  
Furthermore, our scheme supports distributed multidevice authentication with multiple RFID (Radio-Frequency IDentification) user devices.  ...  The proposed scheme is provably secure and provides the full set of privacy-enhancing features, that is, the anonymity, untraceability, and unlinkability of users.  ...  (iii) Anonymity: the scheme allows authentication based on anonymous proofs of knowledge of private user and/or device identifiers.  ... 
doi:10.1155/2018/3295148 fatcat:vydnvw6iubcxrja65fnf2nhiiu

Anonymous Authentication for Smartcards

J. Hajny
2010 Radioengineering  
Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.  ...  We present a communication scheme for keeping one's identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature.  ...  Acknowledgements Sponsored under the National Program of Research II by the Ministry of Education, Youth and Sports of the Czech Republic in 2C08002 Project -KAAPS Research of Universal and Complex Authentication  ... 
doaj:1b7335fffd6a41a0be91ad24e4439d75 fatcat:qnshrv7yefg7rolgf4audcquva

Bi-Crypto: An Efficient System with Enhanced Security

2019 International journal of recent technology and engineering  
A convenient two factor (2f) authentication is used in smart card password verification. Thus, the two factors are "dynamic ID-based" or "anonymous".  ...  To preserve user privacy, a tamper resistant security feature used in smart cards.  ...  For anonymous 2f schemes, a better evaluation metric with appropriate protocol designers and security engineers with a with a practical scheme and better usability tradeoffs.  ... 
doi:10.35940/ijrte.b1756.078219 fatcat:oxn6jb5z6jbj3mcjomrhlxaxdi

A Cross-domain Authentication Method for Cloud Computing

Chen Xu, Jingsha He
2015 International Journal of Security and Its Applications  
Our scheme can not only provide anonymity but also realize the authentication with traceability.  ...  With the method, authentication will not only satisfy the requirement anonymity and security but also can recover the real identity information in special circumstances with the cooperation of multiple  ...  Acknowledgement International Journal of Security and Its Applications Vol. 9, No. 3 (2015) Copyright ⓒ 2015 SERSC The work in the paper has been supported by National Natural Science Foundation of China  ... 
doi:10.14257/ijsia.2015.9.3.22 fatcat:fct6wlpinnht5i4suk7wfxen5a

Privacy-preserving security solution for cloud services

L. Malina, J. Hajny, P. Dzurenda, V. Zeman
2015 Journal of Applied Research and Technology  
We compare the performance of our solution with the related solutionsand schemes.  ...  The novel solution offers anonymous authenticationfor registered users.  ...  The work [9] presents a security approach which uses zero-knowledge proofs providing user anonymous authentication.  ... 
doi:10.1016/s1665-6423(15)30002-x fatcat:zfxcb67cuzduvphn5b5xu4bv44

Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation [article]

Keita Emura and Akira Kanaoka and Satoshi Ohta and Takeshi Takahashi
2014 arXiv   pre-print
with practical performance.  ...  We compare its performance to SSL communication and demonstrate its practicality, and conclude that the protocol realizes secure, anonymous, and authenticated communication between users and service providers  ...  CONCLUSION The proposed protocol along with our group signature enables secure anonymous authentication. It is feasible and practical in terms of transaction time.  ... 
arXiv:1403.7014v3 fatcat:clceb7i2dnc5hf3setjxwkjlbe


Man Ho Au, Apu Kapadia
2012 Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12  
Recently we proposed BLACR, a TTP-free scheme that supports 'reputation-based blacklisting' -the service provider can score users' anonymous sessions (e.g., good vs. inappropriate comments) and users with  ...  To prevent such abuse, a few anonymous credential schemes have been proposed that revoke access for misbehaving users while maintaining their anonymity such that no trusted third party (TTP) is involved  ...  We also thank the anonymous reviewers for their comments and John McCurley for his editorial help.  ... 
doi:10.1145/2382196.2382294 dblp:conf/ccs/AuK12 fatcat:6uv4kdg6ibdiddmuoua7yxjbui

A bilateral remote user authentication scheme that preserves user anonymity

Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
2008 Security and Communication Networks  
Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication.  ...  These crucial merits include (1) a user can freely choose and change his passwords; (2) our scheme provides mutual authentication between a server and a user; (3) it achieves user anonymity; (4) a server  ...  We will also analyze the following security properties: anonymity, mutual authentication, forward secrecy, and known-key security. Theorem 1. The proposed scheme can resist a replay attack. Proof.  ... 
doi:10.1002/sec.26 fatcat:n4aiti6gr5dfnczc3dmw55v5ji

Improved privacy-preserving authentication scheme for roaming service in mobile networks

Ding Wang, Ping Wang, Jing Liu
2014 2014 IEEE Wireless Communications and Networking Conference (WCNC)  
We show that, despite being armed with a formal security proof, this scheme actually cannot achieve user anonymity and is insecure against offline password guessing attacks, and thus, it is not recommended  ...  User authentication is an important security mechanism that allows mobile users to be granted access to roaming service offered by the foreign agent with assistance of the home agent in mobile networks  ...  s scheme [14] is efficient and has been equipped with a formal proof, it fails to meet its essential goal -user anonymity.  ... 
doi:10.1109/wcnc.2014.6953015 dblp:conf/wcnc/WangWL14 fatcat:3i6ozwpihzb4dcaveofecg3f7y

RSA Based Two-factor Remote User Authentication Scheme with User Anonymity

Preeti Chandrakar, Hari Om
2015 Procedia Computer Science  
In this paper, we propose a secure and effective two-factor remote user authentication scheme based on RSA, which achieves mutual authentication and user anonymity properties.  ...  In remote user authentication, the server and the user mutually authenticate each other and establish a common session key for future communication.  ...  In this paper, we propose a two-factor remote user authentication scheme with user anonymity based on RSA that provides mutual authentication with key agreement.  ... 
doi:10.1016/j.procs.2015.10.023 fatcat:x3x7tcujp5fgjpv2qwuxgye2hi

Credential Wrapping

Yanjiang Yang, Haibing Lu, Joseph K. Liu, Jian Weng, Youcheng Zhang, Jianying Zhou
2016 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16  
The anonymous password authentication scheme proposed in ACSAC'10 under an unorthodox approach of password wrapped credentials advanced anonymous password authentication to be a practically ready primitive  ...  Besides better performance, our new method simplifies the configuration of the authentication server, rendering the resulting scheme even more practical.  ...  Security Analysis As specified in [41, 42] , a storage extra APA scheme must satisfy Security of Password, User Unlinkability, and Authenticated Key Exchange.  ... 
doi:10.1145/2897845.2897854 dblp:conf/ccs/YangLLWZZ16 fatcat:iwyzgxp5ujfxdfw7hzagsx4kim

Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices [chapter]

Christian Wachsmann, Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter
2011 Lecture Notes in Computer Science  
A particular issue with fully anonymous authentication schemes is that users cannot easily be prevented from copying and sharing credentials.  ...  We present a new cryptographic scheme with a proof of security, as well as an implementation on ARM TrustZone.  ...  We thank Frederik Armknecht for several useful discussions and the anonymous reviewers for their helpful comments.  ... 
doi:10.1007/978-3-642-18178-8_8 fatcat:fzjckncq5ncu3hfw2bvmhjcqji

A New Approach for Anonymous Password Authentication

Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao
2009 2009 Annual Computer Security Applications Conference  
Anonymous password authentication reinforces password authentication with the protection of user privacy.  ...  However, anonymous password authentication in the standard setting has several inherent weaknesses, making its practicality questionable.  ...  These weaknesses are inherent to conventional anonymous password authentication, making it questionable whether conventional anonymous password authentication is practically useful. Weakness 1.  ... 
doi:10.1109/acsac.2009.26 dblp:conf/acsac/YangZWB09 fatcat:oqlv6fnek5e2niu5bdx5bzkf3e

Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography

Hongfeng Zhu, Yifeng Zhang, Yang Sun
2016 International Journal of Network Security  
Finally, we give the security proof and the efficiency analysis of our proposed scheme.  ...  Then a new PPS authenticated key agreement protocol is given based on chaotic maps. Security of the scheme is based on chaotic maps hard problems and a secure one way hash function.  ...  Then the user uses the secure account to perform the login and authentication procedures with various servers.  ... 
dblp:journals/ijnsec/ZhuZS16 fatcat:utr3dpyvpzdu5lqubg3gv3xc6a

Decentralized, Privacy-Preserving, Single Sign-On

Omid Mir, Michael Roland, René Mayrhofer, David Meghias
2022 Security and Communication Networks  
In current single sign-on authentication schemes on the web, users are required to interact with identity providers securely to set up authentication data during a registration phase and receive a token  ...  We propose a novel decentralized privacy-preserving single sign-on scheme through the Decentralized Anonymous Multi-Factor Authentication (DAMFA), a new authentication scheme where identity providers no  ...  Decentralized Anonymous Multi-Factor Authentication (DAMFA) We build a new practical decentralized multi-factor authentication scheme, Decentralized Anonymous Multi-Factor Authentication (DAMFA), where  ... 
doi:10.1155/2022/9983995 fatcat:5ihbjypejngnjbiu2ibim5hprm
« Previous Showing results 1 — 15 out of 14,150 results