A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Multidevice Authentication with Strong Privacy Protection
2018
Wireless Communications and Mobile Computing
Furthermore, our scheme supports distributed multidevice authentication with multiple RFID (Radio-Frequency IDentification) user devices. ...
The proposed scheme is provably secure and provides the full set of privacy-enhancing features, that is, the anonymity, untraceability, and unlinkability of users. ...
(iii) Anonymity: the scheme allows authentication based on anonymous proofs of knowledge of private user and/or device identifiers. ...
doi:10.1155/2018/3295148
fatcat:vydnvw6iubcxrja65fnf2nhiiu
Anonymous Authentication for Smartcards
2010
Radioengineering
Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results. ...
We present a communication scheme for keeping one's identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. ...
Acknowledgements Sponsored under the National Program of Research II by the Ministry of Education, Youth and Sports of the Czech Republic in 2C08002 Project -KAAPS Research of Universal and Complex Authentication ...
doaj:1b7335fffd6a41a0be91ad24e4439d75
fatcat:qnshrv7yefg7rolgf4audcquva
Bi-Crypto: An Efficient System with Enhanced Security
2019
International journal of recent technology and engineering
A convenient two factor (2f) authentication is used in smart card password verification. Thus, the two factors are "dynamic ID-based" or "anonymous". ...
To preserve user privacy, a tamper resistant security feature used in smart cards. ...
For anonymous 2f schemes, a better evaluation metric with appropriate protocol designers and security engineers with a with a practical scheme and better usability tradeoffs. ...
doi:10.35940/ijrte.b1756.078219
fatcat:oxn6jb5z6jbj3mcjomrhlxaxdi
A Cross-domain Authentication Method for Cloud Computing
2015
International Journal of Security and Its Applications
Our scheme can not only provide anonymity but also realize the authentication with traceability. ...
With the method, authentication will not only satisfy the requirement anonymity and security but also can recover the real identity information in special circumstances with the cooperation of multiple ...
Acknowledgement International Journal of Security and Its Applications Vol. 9, No. 3 (2015) Copyright ⓒ 2015 SERSC The work in the paper has been supported by National Natural Science Foundation of China ...
doi:10.14257/ijsia.2015.9.3.22
fatcat:fct6wlpinnht5i4suk7wfxen5a
Privacy-preserving security solution for cloud services
2015
Journal of Applied Research and Technology
We compare the performance of our solution with the related solutionsand schemes. ...
The novel solution offers anonymous authenticationfor registered users. ...
The work [9] presents a security approach which uses zero-knowledge proofs providing user anonymous authentication. ...
doi:10.1016/s1665-6423(15)30002-x
fatcat:zfxcb67cuzduvphn5b5xu4bv44
Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation
[article]
2014
arXiv
pre-print
with practical performance. ...
We compare its performance to SSL communication and demonstrate its practicality, and conclude that the protocol realizes secure, anonymous, and authenticated communication between users and service providers ...
CONCLUSION The proposed protocol along with our group signature enables secure anonymous authentication. It is feasible and practical in terms of transaction time. ...
arXiv:1403.7014v3
fatcat:clceb7i2dnc5hf3setjxwkjlbe
Recently we proposed BLACR, a TTP-free scheme that supports 'reputation-based blacklisting' -the service provider can score users' anonymous sessions (e.g., good vs. inappropriate comments) and users with ...
To prevent such abuse, a few anonymous credential schemes have been proposed that revoke access for misbehaving users while maintaining their anonymity such that no trusted third party (TTP) is involved ...
We also thank the anonymous reviewers for their comments and John McCurley for his editorial help. ...
doi:10.1145/2382196.2382294
dblp:conf/ccs/AuK12
fatcat:6uv4kdg6ibdiddmuoua7yxjbui
A bilateral remote user authentication scheme that preserves user anonymity
2008
Security and Communication Networks
Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. ...
These crucial merits include (1) a user can freely choose and change his passwords; (2) our scheme provides mutual authentication between a server and a user; (3) it achieves user anonymity; (4) a server ...
We will also analyze the following security properties: anonymity, mutual authentication, forward secrecy, and known-key security. Theorem 1. The proposed scheme can resist a replay attack. Proof. ...
doi:10.1002/sec.26
fatcat:n4aiti6gr5dfnczc3dmw55v5ji
Improved privacy-preserving authentication scheme for roaming service in mobile networks
2014
2014 IEEE Wireless Communications and Networking Conference (WCNC)
We show that, despite being armed with a formal security proof, this scheme actually cannot achieve user anonymity and is insecure against offline password guessing attacks, and thus, it is not recommended ...
User authentication is an important security mechanism that allows mobile users to be granted access to roaming service offered by the foreign agent with assistance of the home agent in mobile networks ...
s scheme [14] is efficient and has been equipped with a formal proof, it fails to meet its essential goal -user anonymity. ...
doi:10.1109/wcnc.2014.6953015
dblp:conf/wcnc/WangWL14
fatcat:3i6ozwpihzb4dcaveofecg3f7y
RSA Based Two-factor Remote User Authentication Scheme with User Anonymity
2015
Procedia Computer Science
In this paper, we propose a secure and effective two-factor remote user authentication scheme based on RSA, which achieves mutual authentication and user anonymity properties. ...
In remote user authentication, the server and the user mutually authenticate each other and establish a common session key for future communication. ...
In this paper, we propose a two-factor remote user authentication scheme with user anonymity based on RSA that provides mutual authentication with key agreement. ...
doi:10.1016/j.procs.2015.10.023
fatcat:x3x7tcujp5fgjpv2qwuxgye2hi
Credential Wrapping
2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16
The anonymous password authentication scheme proposed in ACSAC'10 under an unorthodox approach of password wrapped credentials advanced anonymous password authentication to be a practically ready primitive ...
Besides better performance, our new method simplifies the configuration of the authentication server, rendering the resulting scheme even more practical. ...
Security Analysis As specified in [41, 42] , a storage extra APA scheme must satisfy Security of Password, User Unlinkability, and Authenticated Key Exchange. ...
doi:10.1145/2897845.2897854
dblp:conf/ccs/YangLLWZZ16
fatcat:iwyzgxp5ujfxdfw7hzagsx4kim
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
[chapter]
2011
Lecture Notes in Computer Science
A particular issue with fully anonymous authentication schemes is that users cannot easily be prevented from copying and sharing credentials. ...
We present a new cryptographic scheme with a proof of security, as well as an implementation on ARM TrustZone. ...
We thank Frederik Armknecht for several useful discussions and the anonymous reviewers for their helpful comments. ...
doi:10.1007/978-3-642-18178-8_8
fatcat:fzjckncq5ncu3hfw2bvmhjcqji
A New Approach for Anonymous Password Authentication
2009
2009 Annual Computer Security Applications Conference
Anonymous password authentication reinforces password authentication with the protection of user privacy. ...
However, anonymous password authentication in the standard setting has several inherent weaknesses, making its practicality questionable. ...
These weaknesses are inherent to conventional anonymous password authentication, making it questionable whether conventional anonymous password authentication is practically useful. Weakness 1. ...
doi:10.1109/acsac.2009.26
dblp:conf/acsac/YangZWB09
fatcat:oqlv6fnek5e2niu5bdx5bzkf3e
Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography
2016
International Journal of Network Security
Finally, we give the security proof and the efficiency analysis of our proposed scheme. ...
Then a new PPS authenticated key agreement protocol is given based on chaotic maps. Security of the scheme is based on chaotic maps hard problems and a secure one way hash function. ...
Then the user uses the secure account to perform the login and authentication procedures with various servers. ...
dblp:journals/ijnsec/ZhuZS16
fatcat:utr3dpyvpzdu5lqubg3gv3xc6a
Decentralized, Privacy-Preserving, Single Sign-On
2022
Security and Communication Networks
In current single sign-on authentication schemes on the web, users are required to interact with identity providers securely to set up authentication data during a registration phase and receive a token ...
We propose a novel decentralized privacy-preserving single sign-on scheme through the Decentralized Anonymous Multi-Factor Authentication (DAMFA), a new authentication scheme where identity providers no ...
Decentralized Anonymous Multi-Factor Authentication (DAMFA) We build a new practical decentralized multi-factor authentication scheme, Decentralized Anonymous Multi-Factor Authentication (DAMFA), where ...
doi:10.1155/2022/9983995
fatcat:5ihbjypejngnjbiu2ibim5hprm
« Previous
Showing results 1 — 15 out of 14,150 results