Application and Research of Algebraic Curve in Identity Authentication Security

  • Abstract
  • Highlights & Summary
  • Literature Map
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

Application and Research of Algebraic Curve in Identity Authentication Security

Similar Papers
  • PDF Download Icon
  • Book Chapter
  • Cite Count Icon 1
  • 10.1007/978-981-19-2456-9_108
Certificateless Identity Management and Authentication Scheme Based on Blockchain Technology
  • Jan 1, 2022
  • Chao Han + 1 more

Identity management and authentication in cyberspace is crucial for all forms of remote communication. The traditional authentication technology has great security risks due to its central third-party structure, such as single point of failure, malicious server attacks and so on. The emergence of blockchain technology provides a new way of thinking to solve this problem. This paper focuses on the identity management and authentication scheme based on blockchain technology. Using the decentralized, open and transparent characteristics of blockchain to make up for the shortcomings of traditional identity management and authentication mechanisms. In this paper, we analyze the BIDaaS [1] identity management and authentication scheme proposed by Jong-Hyouk and point out the obvious shortcomings of the scheme, such as suffer impersonating attack simply, virtual identities are not unique. We combine the specificity of biological characteristics to implement a unique virtual identity on the chain and improve the off-chain identity authentication process using a certificateless scheme to build a reasonable and secure identity management and authentication scheme, which realizes two-way authentication and session key agreement. The analysis shows that the scheme has a high level of safety.

  • Research Article
  • Cite Count Icon 2
  • 10.1016/j.jnca.2024.104007
An efficient certificateless blockchain-enabled authentication scheme to secure producer mobility in named data networks
  • Aug 30, 2024
  • Journal of Network and Computer Applications
  • Cong Wang + 5 more

An efficient certificateless blockchain-enabled authentication scheme to secure producer mobility in named data networks

  • Research Article
  • Cite Count Icon 2
  • 10.1038/s41598-025-89502-2
PIA-A secure and efficient identity authentication scheme in telemedicine via the PUF method
  • Feb 26, 2025
  • Scientific Reports
  • Xiong Wang + 5 more

With the rise of IoT technology, remote medical services have gained increasing attention. These services became particularly popular during the COVID-19 pandemic due to their convenience, privacy, and ability to transcend geographical boundaries. In remote medical networks, identity authentication protocols are a crucial component, playing a vital role in ensuring that healthcare providers can operate in a secure and efficient environment. However, some existing identity authentication protocols in remote medical environments are vulnerable to various security threats, such as privileged insider attacks, session key security issues, unauthorized data access, and failure to meet both three-factor security and anonymity. These threats can compromise patient privacy and the integrity of healthcare systems.Therefore, the development of a secure and efficient identity authentication protocol for remote medical services is of utmost importance. To address this need, we propose a Physically Unclonable Function-based identity authentication scheme for telemedicine. In our scheme, we use symmetric encryption and Elliptic Curve Cryptography to encrypt critical information, ensuring a high level of security. We leverage PUF technology to associate devices with users, creating a “device fingerprint” for enhanced authentication. Furthermore, we have provided security proofs for our scheme using the Random Oracle model and the ProVerif protocol analysis tool. Through comprehensive security analysis, we demonstrate that the proposed scheme can resist most known attacks and meets anonymity, forward/backward security, and three-factor security. Lastly, we compared our scheme with existing protocols in terms of computational overhead, storage overhead, and communication overhead using a unified performance benchmark. The results indicate that, while there is no advantage in communication overhead, our scheme reduces computational overhead by approximately 50.71% and storage overhead by 16.32%.

  • Conference Article
  • Cite Count Icon 4
  • 10.1109/sns-pcs.2013.6553858
The research and design of identity authentication based on speech feature
  • May 1, 2013
  • Hongbin Ma + 3 more

In the network security, the identity authentication technology holds the extremely important status, is the information security system first checkpoint. From this the identity authentication is the most basic safe service, other securities serve all must rely on it. This article will describe identity authentication base on speech feature which is a very important way of identity authentication in network security.

  • Research Article
  • Cite Count Icon 5
  • 10.1088/1742-6596/1738/1/012097
Design of Internet of Vehicles Authentication Scheme Based on Blockchain
  • Jan 1, 2021
  • Journal of Physics: Conference Series
  • Chen Mao + 4 more

While the Internet of Vehicles brings convenience to people, it also brings new challenges to vehicle safety. In view of the security problems of data destruction, replay, counterfeiting and monitoring in the information exchange of the Internet of Vehicles, the article aims to improve the security of identity authentication of the Internet of Vehicles, and relies on the framework of Hyperledger Fabric and divides it according to the characteristics of its modular components. Different participating nodes have designed a model of Internet of Vehicles application service platform based on Hyperledger Fabric based on this; using the decentralization of blockchain technology and the non-tamperable characteristics of the data to endorse the vehicle's identity authentication information as a substitute. The traditional CA certification center combines the blockchain technology with the traditional identity authentication technology based on cryptography, and proposes a solution for the Internet of Vehicles identity authentication based on the blockchain technology. Finally, the article makes a security analysis of the scheme, which shows the effectiveness of the method.

  • Research Article
  • Cite Count Icon 4
  • 10.32604/csse.2022.017657
A CPK-Based Identity Authentication Scheme for IoT
  • Jan 1, 2022
  • Computer Systems Science and Engineering
  • Mingming Zhang + 8 more

As the power Internet of Things (IoT) enters the security construction stage, the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and practicality. The existing public key infrastructure (PKI)-based security authentication scheme is currently difficult to apply in many terminals in IoT. Its key distribution and management costs are high, which hinders the development of power IoT security construction. Combined Public Key (CPK) technology uses a small number of seeds to generate unlimited public keys. It is very suitable for identity authentication in the power Internet of Things. In this paper, we propose a novel identity authentication scheme for power IoT. The scheme combines the physical unclonable function (PUF) with improved CPK technology to achieve mutual identity authentication between power IoT terminals and servers. The proposed scheme does not require third-party authentication and improves the security of identity authentication for power IoT. Moreover, the scheme reduces the resource consumption of power IoT devices. The improved CPK algorithm solves the key collision problem, and the third party only needs to save the private key and the public key matrix. Experimental results show that the amount of storage resources occupied in our scheme is small. The proposed scheme is more suitable for the power IoT.

  • Book Chapter
  • Cite Count Icon 1
  • 10.1007/978-3-030-95903-6_4
Design of Identity Authentication Scheme for Dynamic Service Command System Based on SM2 Algorithm and Blockchain Technology
  • Jan 1, 2022
  • Jie Deng + 4 more

To ensure the information security of the dynamic service command system and prevent all kinds of illegal access requests, solve the privacy leakage problem of the command and decision makers in the identification process, it is necessary to conduct strong and secure identity authentication for the personnel who access the dynamic service command system to ensure the system For the security. An identity authentication scheme based on national secret algorithm and blockchain technology is proposed. The scheme creates a user’s authentication block through a consensus mechanism, and uses a dynamic password to combine face recognition with a QR code for security authentication of identity. At the same time, the effectiveness and security of the scheme are studied and analyzed, which shows that the scheme can ensure the privacy of users while providing efficient identity authentication.

  • Book Chapter
  • Cite Count Icon 2
  • 10.1007/978-981-15-3418-8_6
Identity Authentication Under Internet of Everything Based on Edge Computing
  • Jan 1, 2020
  • Zixiao Kong + 4 more

With the rapid development of the Internet, the application of the Internet of things and big data is more and more extensive. The era of Internet of everything (IoE) has come, and the traditional cloud computing model has been unable to efficiently process the massive data generated by a large number of edge devices. Therefore, edge-type big data processing which is oriented to massive data computing generated by network edge devices—edge computing comes into being. However, due to the complexity of edge computing, data security and privacy issues become more prominent. Aiming at the security authentication of edge equipment under the Internet of everything, this paper designs an identity authentication framework under the Internet of everything based on edge computing. In the framework, multi-factor identity authentication is applied to solve the weakness of edge equipment security authentication. Moreover, the software defined network technology (SDN) is adopted to realize the global management of the deployment and application of a large number of edge equipment, which can effectively realize the effective security protection of the Internet of everything. In the end, the formalized verification of the identity authentication process of the designed framework is carried out.

  • Research Article
  • 10.52710/cfs.470
An Efficient Post-Processing Method for SSL-PUF in MEC Security Authentication
  • Mar 13, 2025
  • Computer Fraud and Security
  • Cheng Chen, Qian Zhang, Zhibin Feng

An Efficient Post-Processing Method for SSL-PUF in MEC Security Authentication

  • Conference Article
  • Cite Count Icon 1
  • 10.1109/iccae.2010.5451856
Research on security authentication of hierarchy distributed Wireless Sensor Network
  • Feb 1, 2010
  • Rui Chen

The characteristics of Wireless Sensor Network (WSN) determine that the traditional security authentication mechanism can not meet its security requirements. Starting from the analysis on existing WSN security authentication solution scheme and combing with the widely used hierarchy distributed WSN architecture, the paper referred to the idea of security authentication of PKI with digital certificate and brought out a kind of hierarchy distributed WSN security authentication mechanism. The certificate structure as well as identity and data origin authentication with certificate were designed. The update scheme of certificate and sharing keys was also provided.

  • PDF Download Icon
  • Research Article
  • Cite Count Icon 18
  • 10.1002/int.22283
Privacy‐aware PKI model with strong forward security
  • Aug 30, 2020
  • International Journal of Intelligent Systems
  • Fengyin Li + 5 more

With the development of network technology, privacy protection and users anonymity become a new research hotspot. The existing blockchain privacy‐aware public key infrastructure (PKI) model can ensure the privacy of users in the authentication process to a certain extent, but there are still problems of the storage and leakage of users' keys. This paper first proposes a strong forward‐secure ring signature scheme based on RSA, which ensures the anonymity of the signing users and the forward‐backward security of the keys. Then, by introducing the ring signature technology into the privacy‐aware PKI model, this paper proposes a privacy‐aware PKI model with strong forward security based on block chains, which not only ensures the users' identity privacy, but also solves the problem of the storage and leakage of the users' keys, greatly improving the success rate and security of the users' identity authentication. Finally, this paper applies the proposed PKI model to anonymous transactions, designs a privacy‐aware anonymous transaction model with strong forward security, realizing anonymous transactions without relying on trusted third parties, and implementing users' privacy protection.

  • Conference Article
  • Cite Count Icon 2
  • 10.1109/icpes56491.2022.10073381
Design of Dynamic Password Authentication Scheme Based on SM Algorithm
  • Dec 23, 2022
  • Xiaoqi Liang + 2 more

At present, some identity authentication schemes of intelligent terminals in distribution networks need to install additional hardware or issue digital certificates, and are vulnerable to replay attacks, impersonation attacks and other malicious attacks. To solve the above problems, this paper proposes a dynamic password authentication scheme based on SM2, SM3, SM4 algorithm combined with terminal ID, hardware address MAC, and shared password value PW. This scheme can realize the two-way identity authentication between the power distribution master station and the intelligent power distribution terminal. Experiment simulation and security analysis show that this scheme can resist the common malicious attacks such as replay attack, man in the middle attack and impersonation attack. Compared with other schemes, this scheme has more security features and improves the security of identity authentication while reducing the hardware cost of authentication schemes and avoiding the difficulty of digital certificate management and maintenance.

  • Research Article
  • Cite Count Icon 31
  • 10.1007/s10773-018-3908-y
Quantum Identity Authentication Scheme of Vehicular Ad-Hoc Networks
  • Oct 10, 2018
  • International Journal of Theoretical Physics
  • Zhiya Chen + 2 more

With the development of the intelligent transportation system (ITS) and increasing application of vehicular ad-hoc networks (VANETs), the security of VANETs has become a crucial issue for VANETs and ITS. In this study, we propose a quantum VANETs protection scheme to address the security issue of vehicular identity authentication. It based on BB84 quantum key distribution protocol and quantum mechanics. Furthermore, the novel quantum scheme can defend most VANETs-aimed attacks. It also can be applied on connection of vehicle to everything (V2X), this is because reliability and security problem can be solved in proposed quantum scheme. By tactfully exploiting properties of quantum mechanics, our proposed scheme offers remarkable advantages which include remote identity authentication, identity revocation and irreversibility. The security analysis shows that our proposed scheme can further insure the security of VANETs identity authentication.

  • Conference Article
  • 10.1109/ccieng.2011.6008045
The design and implementation of information system based on the hybrid identity authentication technology
  • Aug 1, 2011
  • Dong Zhong + 1 more

Identity authentication is the very important component for information security technologies. It is the key to protect the security of information systems. This paper proposes a kind of new hybrid identity authentication technology based on the identity authentication technology of traditional information systems, which is combined with a smart card technology, the chaos theory and fingerprint recognition technology. The new hybrid identity authentication technology has been implemented to apply to a mixed information system, the information system has been designed in the paper. Experimental results show that the security of identity authentication in the information system has been improved. It provides a better research direction to protect the security of information systems.

  • Book Chapter
  • Cite Count Icon 1
  • 10.1007/978-3-030-86130-8_11
RF-Ubia: User Biometric Information Authentication Based on RFID
  • Jan 1, 2021
  • Ningwei Peng + 2 more

Traditional authentication technologies usually perform identity authentication based on user information verification (e.g., inputting the password) or biometric information (e.g., fingerprints) for identity authentication. However, there are security risks when these authentication methods are applied solely. For example, if the password is compromised, it is unlikely to determine whether the user is legitimate based on the password. In this paper, we propose RF-Ubia, which combines user information and biometric features to double guarantee the security of identity authentication. The RF-Ubia is a user identification system composed of an array of nine passive tags and a commercial RFID reader, which firstly verifies the user’s password, and then identifies the biometric characteristics of the legitimate user. Due to the coupling effect among tags, any tag signal change caused by the user’s touch operation will affect other tag signals at the same time. Since each user has different fingertip impedance, their touch will cause a unique change of tag signal. Therefore, by combining biometric information, the tag array will uniquely identify users. Evaluations results show that RF-Ubia achieves excellent authentication performance with an average recognition rate of 92.8\({\%}\).

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.