A digital memories based user authentication scheme with privacy preservation

被引:1
|
作者
Liu, JunLiang [1 ]
Lyu, Qiuyun [1 ,2 ]
Wang, Qiuhua [1 ]
Yu, Xiangxiang [1 ]
机构
[1] Hangzhou Dianzi Univ, Sch Cyberspace Secur, Hangzhou, Zhejiang, Peoples R China
[2] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Hangzhou, Zhejiang, Peoples R China
来源
PLOS ONE | 2017年 / 12卷 / 11期
关键词
D O I
10.1371/journal.pone.0186925
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.
引用
收藏
页数:22
相关论文
共 50 条
  • [31] PRIVACY PROTECTION FOR USER AUTHENTICATION
    Hajny, Jan
    Pelka, Tomas
    Zeman, Vaclav
    [J]. SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 90 - 93
  • [32] An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services
    Jeong, Yoon-Su
    Shin, Seung-Soo
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 86 (01) : 7 - 19
  • [33] A novel user authentication and privacy preserving scheme with smart cards for wireless communications
    Li, Chun-Ta
    Lee, Cheng-Chi
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 35 - 44
  • [34] An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services
    Yoon-Su Jeong
    Seung-Soo Shin
    [J]. Wireless Personal Communications, 2016, 86 : 7 - 19
  • [35] A Privacy Authentication Scheme Based on Cloud for Medical Environment
    Chen, Chin-Ling
    Yang, Tsai-Tung
    Chiang, Mao-Lun
    Shih, Tzay-Farn
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (11)
  • [36] A Privacy Authentication Scheme Based on Cloud for Medical Environment
    Chin-Ling Chen
    Tsai-Tung Yang
    Mao-Lun Chiang
    Tzay-Farn Shih
    [J]. Journal of Medical Systems, 2014, 38
  • [37] Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud
    Pawar, Ankush Balaram
    Ghumbre, Shashikant U.
    Jogdand, Rashmi M.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (3-4) : 298 - 322
  • [38] Authentication with Privacy Preservation in Opportunistic Networks
    Kumar, Prashant
    Chauhan, Naveen
    Chand, Narottam
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2017, : 183 - 188
  • [39] A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks
    Al-Shareeda, Mahmood A.
    Anbar, Mohammed
    Manickam, Selvakumar
    Hasbullah, Iznan H.
    [J]. SENSORS, 2022, 22 (05)