Filters








330,339 Hits in 2.5 sec

Private Authentication [chapter]

Martín Abadi
2003 Lecture Notes in Computer Science  
This paper discusses the problem of private authentication and presents two protocols for private authentication of mobile principals.  ...  However, with some care, security protocols can provide authentication for principals that wish to communicate while protecting them from monitoring by third parties.  ...  These inefficiencies are largely unavoidable consequences of the goals of private authentication.  ... 
doi:10.1007/3-540-36467-6_3 fatcat:gpo2uvygwvedhh2h5lcduygkqu

Private authentication

Martı́n Abadi, Cédric Fournet
2004 Theoretical Computer Science  
This paper discusses the problem of private authentication and presents two protocols for private authentication of mobile principals.  ...  However, with some care, security protocols can provide authentication for principals that wish to communicate while protecting them from monitoring by third parties.  ...  These inefficiencies are largely unavoidable consequences of the goals of private authentication.  ... 
doi:10.1016/j.tcs.2003.12.023 fatcat:7xyzqvxgzbdz3lxrmwq5roc7lq

Group-Based Private Authentication

Gildas Avoine, Levente Buttyant, Tamas Holczer, Istvan Vajda
2007 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks  
We analyze the proposed scheme and show that it is superior to the wellknown key-tree based approach for private authentication both in terms of privacy and efficiency. search through a set of candidate  ...  We propose a novel authentication scheme that ensures privacy of the provers.  ...  Operation of the group-based private authentication scheme.  ... 
doi:10.1109/wowmom.2007.4351808 dblp:conf/wowmom/AvoineBHV07 fatcat:doajn3befvaevpff5safehitny

Randomizing RFID private authentication

Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, Xiangyang Li, Yunhao Liu
2009 2009 IEEE International Conference on Pervasive Computing and Communications  
To address the issue, we propose a lightweight RFID private authentication protocol, RWP, based on the random walk concept.  ...  The analysis results show that RWP effectively enhances the security protection for RFID private authentication, and increases the authentication efficiency from O(logN) to O(1).  ...  In RFID systems, a private authentication protocol should meet the above security requirements. Privacy. Any user's private information should not be leaked to any third party during authentication.  ... 
doi:10.1109/percom.2009.4912773 dblp:conf/percom/YaoQHZLL09 fatcat:3ngleedh6zeuzch7ymgenmzkpq

Private Eyes: Secure Remote Biometric Authentication

Ewa Syta, Michael J. Fischer, David Wolinsky, Abraham Silberschatz, Gina Gallegos-Garcia, Bryan Ford
2015 Proceedings of the 12th International Conference on Security and Cryptography  
The protocol works by encrypting the user's biometric template in a way that allows it to be used for authentication without being decrypted by either token or server.  ...  We propose an efficient remote biometric authentication protocol that gives strong protection to the user's biometric data in case of two common kinds of security breaches: (1) loss or theft of the user's  ...  He retains R 0 and s 1 in private storage. To summarize, after the enrollment phase: • Peggy's token stores T 0 = P ref ⊕ R 0 and s 1 . • Victor retains R 0 = r 0 and s 1 .  ... 
doi:10.5220/0005539602430250 dblp:conf/secrypt/SytaFWSGF15 fatcat:wcky7nvduvdzblcbgtekw3h7ay

Information Theoretic Framework for Single and Multi-Server Private Authentication [article]

Narges Kazempour, Mahtab Mirmohseni, Mohammad Reza Aref
2021 arXiv   pre-print
In this paper, the private authentication problem is considered that consists of a certificate authority, a verifier (or verifiers), many legitimate users (prover) and arbitrary number of attackers.  ...  In distributed authentication, the process of authentication is done collaboratively by all the verifiers.  ...  Index Terms Information theoretic privacy, private authentication, Shamir's secret sharing, random binning, Symmetric private information retrieval. I.  ... 
arXiv:1901.05927v4 fatcat:2cqv2rhnk5co5afc5g4qo5plfi

SECURE AND PRIVATE FINGERPRINT-BASED AUTHENTICATION

ARATHI ARAKALA
2009 Bulletin of the Australian Mathematical Society  
One of the vital applications for biometrics is its ability to replace passwords or PINs in a secure authentication system.  ...  The principal aim of this thesis was to implement a fingerprint minutiae-based authentication system where the minutiae template is secure during storage and during comparison.  ...  One of the vital applications for biometrics is its ability to replace passwords or PINs in a secure authentication system.  ... 
doi:10.1017/s0004972709000665 fatcat:onnef4ynmbbhnbak244f7cts7m

Intersection-policy private mutual authentication from authorized private set intersection

Yamin Wen, Fangguo Zhang, Huaxiong Wang, Yinbin Miao, Zheng Gong
2020 Science China Information Sciences  
Derived from the presented IBE-APSI, our proposed IP-PMA also realizes the intersection policies for private mutual authentications.  ...  Thus, the private mutual authentication (PMA) protocol (i.e., unlinkable secret handshake scheme) [1] is generally used to solve such affiliation-hiding problem.  ... 
doi:10.1007/s11432-019-9907-x fatcat:gxzpb57jtbcbhfc6ixrxmtcthy

Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication [article]

Onur Günlü, Rafael F. Schaefer, H. Vincent Poor
2020 arXiv   pre-print
The problem of secret-key based authentication under privacy and storage constraints on the source sequence is considered.  ...  The identifier measurement channels during authentication are assumed to be controllable via a cost-constrained action sequence.  ...  We extend the source model for key agreement from [4] , [5] to consider multiple improvements to private authentication with PUFs and biometrics.  ... 
arXiv:2001.00847v4 fatcat:f5tdtwkw5vepzhxzzrgqssqaxu

Private Authentication with Physical Identifiers Through Broadcast Channel Measurements [article]

Onur Günlü, Rafael F. Schaefer, Gerhard Kramer
2019 arXiv   pre-print
Using W and the BC measurements Y n , the decoder generates the key estimateŜ that is used for device authentication.  ...  We remark that in [7] , [8] , [13] , a "private" key that is available to the encoder and decoder and that is hidden from the eavesdropper is considered to obtain strong privacy.  ... 
arXiv:1907.01081v1 fatcat:azfcsesujbcm3gs3yys4u56mdm

Private Mutual Authentication and Conditional Oblivious Transfer [chapter]

Stanisław Jarecki, Xiaomin Liu
2009 Lecture Notes in Computer Science  
A bi-directional Private Authentication, or Unlinkable Secret Handshake, allows two parties to authenticate each other as certified by given certification authorities (i.e. affiliated with given groups  ...  ), in a mutually private way, in the sense that the protocol leaks no information about either participant to a party which does not satisfy that participant's authentication policy.  ...  Introduction Authentication Privacy and Mutual Authentication.  ... 
doi:10.1007/978-3-642-03356-8_6 fatcat:l35nstx2dvf6lengoi2zkf4a4u

Virtual Private Cloud and Authentication: A Review

Gaurav Deep, Rajni Mohana, Paramroop Kaur
2018 Asian Journal of Computer Science and Technology  
In this Paper, we've reviewed the existing work so as tounderstand the concept of cloud computing, virtual private cloud and proposed a multifactor authentication technique which uses biometric trait along  ...  The cloud supports characteristic such as on demand services, resource pooling, elasticity .While authentication plays important role in the security as it protects the data from the unauthorized people  ...  Private cloud: As its name implies private, is used by a single organization that is why called private cloud, so its resources or services are private to its organization only.The cloud infrastructure  ... 
doi:10.51983/ajcst-2018.7.2.1862 fatcat:wrz2gie3mfdv7hkkjhwdvmdnti

Authenticating Privately over Public Wi-Fi Hotspots

Aldo Cassola, Erik-Oliver Blass, Guevara Noubir
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
Our protocol is based on Private Information Retrieval (PIR) with an augmented cheating detection mechanism based on our extensions to the NTRU encryption scheme.  ...  We propose a protocol and system that allows a service provider to authenticate its clients, and hides the client identity from both AP and service provider at the time of authentication.  ...  This ensures the authentication server has a set of authentic public and private keys that can be verified with a Certification Authority.  ... 
doi:10.1145/2810103.2813647 dblp:conf/ccs/CassolaBN15 fatcat:o7sczhletvd53arl3dqwozda2i

Iris Authentication Using Privatized Advanced Correlation Filter [chapter]

Siew Chin Chong, Andrew Beng Jin Teoh, David Chek Ling Ngo
2005 Lecture Notes in Computer Science  
The objective of the proposed method is to provide private biometrics realization in iris authentication in which biometric template can be reissued once it was compromised.  ...  This paper proposes a private biometrics formulation which is based on the concealment of random kernel and the iris images to synthesize a minimum average correlation energy (MACE) filter for iris authentication  ...  Conclusion and Future Works In this paper, a promising method for private iris authentication is presented.  ... 
doi:10.1007/11608288_51 fatcat:ytwt5hrqhvewddut4fdrhmrngm

AnonPri: An efficient anonymous private authentication protocol

Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed
2011 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom)  
Therefore, in this paper, we propose a group based anonymous private authentication protocol (AnonPri) that provides higher level of privacy than the above mention group based scheme and achieves better  ...  Project Summary: Privacy protection is a very important issue during authentications in RFID systems.  ...  To address this problem, we designed a new privacy preserving data aggregation scheme, REBIVE (REliaBle prIVate data aggrEgation scheme).  ... 
doi:10.1109/percom.2011.5767573 dblp:conf/percom/HoqueRA11 fatcat:jmt6236qizccfa4rdjouv2uwga
« Previous Showing results 1 — 15 out of 330,339 results