A secure and robust authentication scheme between human and computer

被引:0
|
作者
Ding, Yi [1 ]
机构
[1] Dezhou Univ, Dezhou 253023, Peoples R China
关键词
mutual authentication; password-based system; mobile station;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic authentication with,a token such as a smart card ha been used more and more widely. It is necessary to ensure the security of the token and sensitive information such as password when it is communicating with client server. In traditional authentication methods, the token often is regarded as the human user himself. So the mutual authentication between Human user and server computer of service provider is an important issue, which can protect the user from cheating by unreliable client server. Based on mobile station which has been widely used and of stronger computing ability, this paper proposes a new protocol that is built upon a novel two channel model, where mobile station is used to enhance the authentication between human and computer. Our system possesses a number of appealing features. By mobile station, it provides another interface to human, so the authentication is enhanced not only between the human and the client server, but also between the human and the token. Public key cryptosystem is avoided, so our protocols are quite efficient in terms of both communication and computation.
引用
收藏
页码:1034 / 1036
页数:3
相关论文
共 50 条
  • [31] A Secure Authentication Scheme with Anonymity for Wireless Communications
    Wu, Chia-Chun
    Lee, Wei-Bin
    Tsaur, Woei-Jiunn
    [J]. IEEE COMMUNICATIONS LETTERS, 2008, 12 (10) : 722 - 723
  • [32] A SECURE PUBLIC-KEY AUTHENTICATION SCHEME
    GALIL, Z
    HABER, S
    YUNG, M
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 3 - 15
  • [33] A secure RFID authentication scheme for medicine applications
    Wu, Zhen-Yu
    Chen, Tzer-Long
    Lin, Sung-Chiang
    Wang, Charlotte
    [J]. 2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 175 - 181
  • [34] A secure authentication scheme based on fuzzy extractor
    Zhang, Lihua
    Nie, Yaoping
    [J]. Computer Modelling and New Technologies, 2014, 18 (12): : 46 - 55
  • [35] Secure and Efficient Authentication Scheme in IoT Environments
    Thakare, Abhijeet
    Kim, Young-Gab
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (03): : 1 - 27
  • [36] SECURE AUTHENTICATION AND AUTHORIZATION SCHEME FOR MOBILE DEVICES
    Wang, Jian
    Jiang, Nan
    [J]. PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND APPLICATIONS, 2009, : 207 - +
  • [37] Secure authentication scheme for IoT and cloud servers
    Kalra, Sheetal
    Sood, Sandeep K.
    [J]. PERVASIVE AND MOBILE COMPUTING, 2015, 24 : 210 - 223
  • [38] Efficient and secure message authentication scheme for VANET
    [J]. Wu, Li-Bing (wu@whu.edu.cn), 1600, Editorial Board of Journal on Communications (37):
  • [39] Secure Multicast Authentication Scheme using DTLS
    Woo, Si-Jae
    Kwak, Jin
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS AND INFORMATION PROCESSING TECHNOLOGY (CAIPT), 2017, : 133 - 137
  • [40] A Secure Mutual Authentication Scheme for Wireless Communication
    Song, Jie
    Pan, Xiangyu
    Li, Fagen
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 : 114 - 130