Application and Research of Algebraic Curve in Identity Authentication Security
Application and Research of Algebraic Curve in Identity Authentication Security
- Book Chapter
1
- 10.1007/978-981-19-2456-9_108
- Jan 1, 2022
Identity management and authentication in cyberspace is crucial for all forms of remote communication. The traditional authentication technology has great security risks due to its central third-party structure, such as single point of failure, malicious server attacks and so on. The emergence of blockchain technology provides a new way of thinking to solve this problem. This paper focuses on the identity management and authentication scheme based on blockchain technology. Using the decentralized, open and transparent characteristics of blockchain to make up for the shortcomings of traditional identity management and authentication mechanisms. In this paper, we analyze the BIDaaS [1] identity management and authentication scheme proposed by Jong-Hyouk and point out the obvious shortcomings of the scheme, such as suffer impersonating attack simply, virtual identities are not unique. We combine the specificity of biological characteristics to implement a unique virtual identity on the chain and improve the off-chain identity authentication process using a certificateless scheme to build a reasonable and secure identity management and authentication scheme, which realizes two-way authentication and session key agreement. The analysis shows that the scheme has a high level of safety.
- Research Article
2
- 10.1016/j.jnca.2024.104007
- Aug 30, 2024
- Journal of Network and Computer Applications
An efficient certificateless blockchain-enabled authentication scheme to secure producer mobility in named data networks
- Research Article
2
- 10.1038/s41598-025-89502-2
- Feb 26, 2025
- Scientific Reports
With the rise of IoT technology, remote medical services have gained increasing attention. These services became particularly popular during the COVID-19 pandemic due to their convenience, privacy, and ability to transcend geographical boundaries. In remote medical networks, identity authentication protocols are a crucial component, playing a vital role in ensuring that healthcare providers can operate in a secure and efficient environment. However, some existing identity authentication protocols in remote medical environments are vulnerable to various security threats, such as privileged insider attacks, session key security issues, unauthorized data access, and failure to meet both three-factor security and anonymity. These threats can compromise patient privacy and the integrity of healthcare systems.Therefore, the development of a secure and efficient identity authentication protocol for remote medical services is of utmost importance. To address this need, we propose a Physically Unclonable Function-based identity authentication scheme for telemedicine. In our scheme, we use symmetric encryption and Elliptic Curve Cryptography to encrypt critical information, ensuring a high level of security. We leverage PUF technology to associate devices with users, creating a “device fingerprint” for enhanced authentication. Furthermore, we have provided security proofs for our scheme using the Random Oracle model and the ProVerif protocol analysis tool. Through comprehensive security analysis, we demonstrate that the proposed scheme can resist most known attacks and meets anonymity, forward/backward security, and three-factor security. Lastly, we compared our scheme with existing protocols in terms of computational overhead, storage overhead, and communication overhead using a unified performance benchmark. The results indicate that, while there is no advantage in communication overhead, our scheme reduces computational overhead by approximately 50.71% and storage overhead by 16.32%.
- Conference Article
4
- 10.1109/sns-pcs.2013.6553858
- May 1, 2013
In the network security, the identity authentication technology holds the extremely important status, is the information security system first checkpoint. From this the identity authentication is the most basic safe service, other securities serve all must rely on it. This article will describe identity authentication base on speech feature which is a very important way of identity authentication in network security.
- Research Article
5
- 10.1088/1742-6596/1738/1/012097
- Jan 1, 2021
- Journal of Physics: Conference Series
While the Internet of Vehicles brings convenience to people, it also brings new challenges to vehicle safety. In view of the security problems of data destruction, replay, counterfeiting and monitoring in the information exchange of the Internet of Vehicles, the article aims to improve the security of identity authentication of the Internet of Vehicles, and relies on the framework of Hyperledger Fabric and divides it according to the characteristics of its modular components. Different participating nodes have designed a model of Internet of Vehicles application service platform based on Hyperledger Fabric based on this; using the decentralization of blockchain technology and the non-tamperable characteristics of the data to endorse the vehicle's identity authentication information as a substitute. The traditional CA certification center combines the blockchain technology with the traditional identity authentication technology based on cryptography, and proposes a solution for the Internet of Vehicles identity authentication based on the blockchain technology. Finally, the article makes a security analysis of the scheme, which shows the effectiveness of the method.
- Research Article
4
- 10.32604/csse.2022.017657
- Jan 1, 2022
- Computer Systems Science and Engineering
As the power Internet of Things (IoT) enters the security construction stage, the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and practicality. The existing public key infrastructure (PKI)-based security authentication scheme is currently difficult to apply in many terminals in IoT. Its key distribution and management costs are high, which hinders the development of power IoT security construction. Combined Public Key (CPK) technology uses a small number of seeds to generate unlimited public keys. It is very suitable for identity authentication in the power Internet of Things. In this paper, we propose a novel identity authentication scheme for power IoT. The scheme combines the physical unclonable function (PUF) with improved CPK technology to achieve mutual identity authentication between power IoT terminals and servers. The proposed scheme does not require third-party authentication and improves the security of identity authentication for power IoT. Moreover, the scheme reduces the resource consumption of power IoT devices. The improved CPK algorithm solves the key collision problem, and the third party only needs to save the private key and the public key matrix. Experimental results show that the amount of storage resources occupied in our scheme is small. The proposed scheme is more suitable for the power IoT.
- Book Chapter
1
- 10.1007/978-3-030-95903-6_4
- Jan 1, 2022
To ensure the information security of the dynamic service command system and prevent all kinds of illegal access requests, solve the privacy leakage problem of the command and decision makers in the identification process, it is necessary to conduct strong and secure identity authentication for the personnel who access the dynamic service command system to ensure the system For the security. An identity authentication scheme based on national secret algorithm and blockchain technology is proposed. The scheme creates a user’s authentication block through a consensus mechanism, and uses a dynamic password to combine face recognition with a QR code for security authentication of identity. At the same time, the effectiveness and security of the scheme are studied and analyzed, which shows that the scheme can ensure the privacy of users while providing efficient identity authentication.
- Book Chapter
2
- 10.1007/978-981-15-3418-8_6
- Jan 1, 2020
With the rapid development of the Internet, the application of the Internet of things and big data is more and more extensive. The era of Internet of everything (IoE) has come, and the traditional cloud computing model has been unable to efficiently process the massive data generated by a large number of edge devices. Therefore, edge-type big data processing which is oriented to massive data computing generated by network edge devices—edge computing comes into being. However, due to the complexity of edge computing, data security and privacy issues become more prominent. Aiming at the security authentication of edge equipment under the Internet of everything, this paper designs an identity authentication framework under the Internet of everything based on edge computing. In the framework, multi-factor identity authentication is applied to solve the weakness of edge equipment security authentication. Moreover, the software defined network technology (SDN) is adopted to realize the global management of the deployment and application of a large number of edge equipment, which can effectively realize the effective security protection of the Internet of everything. In the end, the formalized verification of the identity authentication process of the designed framework is carried out.
- Research Article
- 10.52710/cfs.470
- Mar 13, 2025
- Computer Fraud and Security
An Efficient Post-Processing Method for SSL-PUF in MEC Security Authentication
- Conference Article
1
- 10.1109/iccae.2010.5451856
- Feb 1, 2010
The characteristics of Wireless Sensor Network (WSN) determine that the traditional security authentication mechanism can not meet its security requirements. Starting from the analysis on existing WSN security authentication solution scheme and combing with the widely used hierarchy distributed WSN architecture, the paper referred to the idea of security authentication of PKI with digital certificate and brought out a kind of hierarchy distributed WSN security authentication mechanism. The certificate structure as well as identity and data origin authentication with certificate were designed. The update scheme of certificate and sharing keys was also provided.
- Research Article
18
- 10.1002/int.22283
- Aug 30, 2020
- International Journal of Intelligent Systems
With the development of network technology, privacy protection and users anonymity become a new research hotspot. The existing blockchain privacy‐aware public key infrastructure (PKI) model can ensure the privacy of users in the authentication process to a certain extent, but there are still problems of the storage and leakage of users' keys. This paper first proposes a strong forward‐secure ring signature scheme based on RSA, which ensures the anonymity of the signing users and the forward‐backward security of the keys. Then, by introducing the ring signature technology into the privacy‐aware PKI model, this paper proposes a privacy‐aware PKI model with strong forward security based on block chains, which not only ensures the users' identity privacy, but also solves the problem of the storage and leakage of the users' keys, greatly improving the success rate and security of the users' identity authentication. Finally, this paper applies the proposed PKI model to anonymous transactions, designs a privacy‐aware anonymous transaction model with strong forward security, realizing anonymous transactions without relying on trusted third parties, and implementing users' privacy protection.
- Conference Article
2
- 10.1109/icpes56491.2022.10073381
- Dec 23, 2022
At present, some identity authentication schemes of intelligent terminals in distribution networks need to install additional hardware or issue digital certificates, and are vulnerable to replay attacks, impersonation attacks and other malicious attacks. To solve the above problems, this paper proposes a dynamic password authentication scheme based on SM2, SM3, SM4 algorithm combined with terminal ID, hardware address MAC, and shared password value PW. This scheme can realize the two-way identity authentication between the power distribution master station and the intelligent power distribution terminal. Experiment simulation and security analysis show that this scheme can resist the common malicious attacks such as replay attack, man in the middle attack and impersonation attack. Compared with other schemes, this scheme has more security features and improves the security of identity authentication while reducing the hardware cost of authentication schemes and avoiding the difficulty of digital certificate management and maintenance.
- Research Article
31
- 10.1007/s10773-018-3908-y
- Oct 10, 2018
- International Journal of Theoretical Physics
With the development of the intelligent transportation system (ITS) and increasing application of vehicular ad-hoc networks (VANETs), the security of VANETs has become a crucial issue for VANETs and ITS. In this study, we propose a quantum VANETs protection scheme to address the security issue of vehicular identity authentication. It based on BB84 quantum key distribution protocol and quantum mechanics. Furthermore, the novel quantum scheme can defend most VANETs-aimed attacks. It also can be applied on connection of vehicle to everything (V2X), this is because reliability and security problem can be solved in proposed quantum scheme. By tactfully exploiting properties of quantum mechanics, our proposed scheme offers remarkable advantages which include remote identity authentication, identity revocation and irreversibility. The security analysis shows that our proposed scheme can further insure the security of VANETs identity authentication.
- Conference Article
- 10.1109/ccieng.2011.6008045
- Aug 1, 2011
Identity authentication is the very important component for information security technologies. It is the key to protect the security of information systems. This paper proposes a kind of new hybrid identity authentication technology based on the identity authentication technology of traditional information systems, which is combined with a smart card technology, the chaos theory and fingerprint recognition technology. The new hybrid identity authentication technology has been implemented to apply to a mixed information system, the information system has been designed in the paper. Experimental results show that the security of identity authentication in the information system has been improved. It provides a better research direction to protect the security of information systems.
- Book Chapter
1
- 10.1007/978-3-030-86130-8_11
- Jan 1, 2021
Traditional authentication technologies usually perform identity authentication based on user information verification (e.g., inputting the password) or biometric information (e.g., fingerprints) for identity authentication. However, there are security risks when these authentication methods are applied solely. For example, if the password is compromised, it is unlikely to determine whether the user is legitimate based on the password. In this paper, we propose RF-Ubia, which combines user information and biometric features to double guarantee the security of identity authentication. The RF-Ubia is a user identification system composed of an array of nine passive tags and a commercial RFID reader, which firstly verifies the user’s password, and then identifies the biometric characteristics of the legitimate user. Due to the coupling effect among tags, any tag signal change caused by the user’s touch operation will affect other tag signals at the same time. Since each user has different fingertip impedance, their touch will cause a unique change of tag signal. Therefore, by combining biometric information, the tag array will uniquely identify users. Evaluations results show that RF-Ubia achieves excellent authentication performance with an average recognition rate of 92.8\({\%}\).
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.