A secure and robust authentication scheme between human and computer

被引:0
|
作者
Ding, Yi [1 ]
机构
[1] Dezhou Univ, Dezhou 253023, Peoples R China
关键词
mutual authentication; password-based system; mobile station;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic authentication with,a token such as a smart card ha been used more and more widely. It is necessary to ensure the security of the token and sensitive information such as password when it is communicating with client server. In traditional authentication methods, the token often is regarded as the human user himself. So the mutual authentication between Human user and server computer of service provider is an important issue, which can protect the user from cheating by unreliable client server. Based on mobile station which has been widely used and of stronger computing ability, this paper proposes a new protocol that is built upon a novel two channel model, where mobile station is used to enhance the authentication between human and computer. Our system possesses a number of appealing features. By mobile station, it provides another interface to human, so the authentication is enhanced not only between the human and the client server, but also between the human and the token. Public key cryptosystem is avoided, so our protocols are quite efficient in terms of both communication and computation.
引用
收藏
页码:1034 / 1036
页数:3
相关论文
共 50 条
  • [1] A robust and secure signature scheme for video authentication
    Ahmed, Fawad
    Siyal, M. Y.
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 2126 - 2129
  • [2] A secure and robust authentication scheme for video transcoding
    Sun, Qibin
    He, Dajun
    Tian, Qi
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2006, 16 (10) : 1232 - 1244
  • [3] Secure Electronic Healthcare Record Using Robust Authentication Scheme
    Yaseen, Aqeel A.
    Patel, Kalyani
    Yassin, Ali A.
    Aldarwish, Abdulla J.
    Hussein, Haitham A.
    [J]. IAENG International Journal of Computer Science, 2023, 50 (02)
  • [4] A secure and robust hash-based scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    Abbas, Vali Uddin
    [J]. SIGNAL PROCESSING, 2010, 90 (05) : 1456 - 1470
  • [5] On authentication between human and computer
    Watanabe, T
    Nohara, Y
    Baba, K
    Inoue, S
    Yasuura, H
    [J]. FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 636 - +
  • [6] A secure and robust wavelet-based hashing scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    [J]. ADVANCES IN MULTIMEDIA MODELING, PT 2, 2007, 4352 : 51 - +
  • [7] A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications
    al Mahmod, Md Jubayer
    Guin, Ujjwal
    [J]. CRYPTOGRAPHY, 2020, 4 (01) : 1 - 20
  • [8] Highly Secure Authentication Scheme
    Narhar, Ushir Kishori
    Joshi, Ram B.
    [J]. 1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 270 - 274
  • [9] A Secure Authentication Scheme for MobiCloud
    Donald, A. Cecil
    Arockiam, L.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2015,
  • [10] Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications
    Arpitha T.
    Chouhan D.
    Shreyas J.
    [J]. Journal of Engineering and Applied Science, 2024, 71 (01):