An integrated user authentication and access control scheme without public key cryptography

被引:0
|
作者
Chien, HY [1 ]
Jan, JK [1 ]
机构
[1] ChaoYang Univ Technol, Dept Informat Management, Taichung 413, Taiwan
来源
37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS | 2003年
关键词
cryptography; authentication; access control; public key; hashing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Conventionally, user authentication and access control are two separate security mechanisms in many distributed systems. An integrated design of user authentication and access control may provide better performance in terms of security and computational complexity. This paper discusses the pros and cons of the separate approach and the integrated approach, and then proposes a new integrated scheme without using public key cryptography. The new scheme has several practical merits - no user-sensitive data stored on the server, no storage for access list or capability list on the server, extreme low computational cost, the freedom of choosing users' passwords, and mutual authentication.
引用
收藏
页码:137 / 143
页数:7
相关论文
共 50 条
  • [1] Integrated OTP-based user authentication and access control scheme in home networks
    Jeong, Jongpil
    Chung, Min Young
    Choo, Hyunseung
    MANAGING NEXT GENERATION NETWORKS AND SERVICES, PROCEEDINGS, 2007, 4773 : 123 - +
  • [2] An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography
    Huang, Baojun
    Khan, Muhammad Khurram
    Wu, Libing
    Bin Muhaya, Fahad T.
    He, Debiao
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (01) : 225 - 240
  • [3] An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography
    Baojun Huang
    Muhammad Khurram Khan
    Libing Wu
    Fahad T. Bin Muhaya
    Debiao He
    Wireless Personal Communications, 2015, 85 : 225 - 240
  • [4] A novel anonymous authentication scheme without cryptography
    Shi, Run-hua
    Zhong, Hong
    Huang, Liu-sheng
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2014, 25 (09): : 875 - 880
  • [5] THE DESIGN OF DYNAMIC ACCESS-CONTROL SCHEME WITH USER AUTHENTICATION
    YEN, SM
    LAIH, CS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 25 (07) : 27 - 32
  • [6] ANALYSIS AND IMPROVEMENT OF AN ACCESS-CONTROL SCHEME WITH USER AUTHENTICATION
    YEN, SM
    LAIH, CS
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (05): : 271 - 273
  • [7] A Public-key Cryptography and A Entity Authentication Scheme Based on Improved Hyperbolic Function
    Wang, Dahu
    Bai, Heyuan
    Liu, Qunpo
    Tong, Zhaojing
    IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, 2008, : 530 - 533
  • [8] An integrated scheme for authentication and access control in a digital TV environment
    Chung, Min Gyo
    Kim, Yong
    2008 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, 2008, : 179 - 180
  • [9] A User Access Control Scheme for Reducing Authentication Keys in Cloud Systems
    Hong, Seungtae
    Kim, Hyeongil
    Kim, Taehoon
    Chang, Jaewoo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 229 - 240
  • [10] A new key-lock method for user authentication and access control
    Ji, DY
    Zhang, FT
    Wang, YM
    CHINESE JOURNAL OF ELECTRONICS, 2001, 10 (03): : 411 - 414