A Two-Factor Authentication Scheme based on Negative Databases

被引:0
|
作者
Liu, Ran [1 ]
Wang, Xiang [1 ]
Wang, Can [2 ]
机构
[1] China Univ Geosci, Sch Comp Sci, Wuhan 430074, Hubei, Peoples R China
[2] Griffith Univ, Sch Informat & Commun Technol, Gold Coast, Australia
基金
中国国家自然科学基金;
关键词
artificial immune system; NP-Complete; negative databases; two-factor authentication;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In some scenes such as smart mobile terminal, low energy consumption and high efficiency are highly important in information security. So two-factor authentication scheme based on classical encryption algorithms are not suitable in some scenes. Negative database (NDB), inspired by the artificial immune system, is significant with wide applications in information security and privacy protection for the high efficiency. Password authentication schemes based on NDBs can be used in mobile internet, sensor network and smart card because of the high efficiency of generating NDBs. This paper proposes a two-factor authentication scheme based on NUBs, the security of the scheme depends on the NP-Completeness of reversing an NDB to obtain the original database (DB). The efficiency of this proposed scheme is similar to the present one-time password authentication scheme based on NUBs. The efficiency and the security of this proposed scheme is analyzed as well.
引用
收藏
页码:1110 / 1115
页数:6
相关论文
共 50 条
  • [1] An efficient two-factor authentication scheme based on negative databases: Experiments and extensions
    Liu, Ran
    Wang, Xiang
    Wang, Can
    [J]. APPLIED SOFT COMPUTING, 2022, 119
  • [2] On the Security of a Two-Factor Authentication Scheme
    Catuogno, Luigi
    Galdi, Clemente
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 245 - +
  • [3] An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree
    Yin, Xinming
    He, Junhui
    Guo, Yi
    Han, Dezhi
    Li, Kuan-Ching
    Castiglione, Arcangelo
    [J]. SENSORS, 2020, 20 (20) : 1 - 19
  • [4] Gaithashing: A two-factor authentication scheme based on gait features
    Ntantogian, Christoforos
    Malliaros, Stefanos
    Xenakis, Christos
    [J]. COMPUTERS & SECURITY, 2015, 52 : 17 - 32
  • [5] A Usable and Secure Two-Factor Authentication Scheme
    Akram, Syed
    Misbahuddin, Mohammed
    Varaprasad, G.
    [J]. INFORMATION SECURITY JOURNAL, 2012, 21 (04): : 169 - 182
  • [6] Two-factor identity authentication scheme based on blockchain and fuzzy extractor
    Di Bao
    Lin You
    [J]. Soft Computing, 2023, 27 : 1091 - 1103
  • [7] Two-factor identity authentication scheme based on blockchain and fuzzy extractor
    Bao, Di
    You, Lin
    [J]. SOFT COMPUTING, 2023, 27 (02) : 1091 - 1103
  • [8] Two-factor localized authentication scheme for WLAN roaming
    Lin, Xiaodong
    Zhu, Haojin
    Ho, Pin-Han
    Shen, Xuemin
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1172 - 1178
  • [9] A Two-Factor Authentication Scheme for Moving Connected Vehicles
    Suo, Dajiang
    Sarma, Sanjay E.
    [J]. 2022 IEEE 96TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-FALL), 2022,
  • [10] A novel optical two-factor face authentication scheme
    Verma, Gaurav
    Liao, Meihua
    Lu, Dajiang
    He, Wenqi
    Peng, Xiang
    [J]. OPTICS AND LASERS IN ENGINEERING, 2019, 123 : 28 - 36