An integrated user authentication and access control scheme without public key cryptography

被引:0
|
作者
Chien, HY [1 ]
Jan, JK [1 ]
机构
[1] ChaoYang Univ Technol, Dept Informat Management, Taichung 413, Taiwan
来源
37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS | 2003年
关键词
cryptography; authentication; access control; public key; hashing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Conventionally, user authentication and access control are two separate security mechanisms in many distributed systems. An integrated design of user authentication and access control may provide better performance in terms of security and computational complexity. This paper discusses the pros and cons of the separate approach and the integrated approach, and then proposes a new integrated scheme without using public key cryptography. The new scheme has several practical merits - no user-sensitive data stored on the server, no storage for access list or capability list on the server, extreme low computational cost, the freedom of choosing users' passwords, and mutual authentication.
引用
收藏
页码:137 / 143
页数:7
相关论文
共 50 条
  • [21] A Cryptocurrency Without Public-Key Cryptography
    Bonneau, Joseph
    Miller, Andrew
    SECURITY PROTOCOLS XXII, 2014, 8809 : 350 - 358
  • [22] A Blockchain-Based User Authentication Scheme with Access Control for Telehealth Systems
    Shi, Shuyun
    Luo, Min
    Wen, Yihong
    Wang, Lianhai
    He, Debiao
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [23] ID Authentication in PTPM and Public Key Cryptography in Cloud Environment
    Xia, Hui
    2018 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2018), 2018, : 256 - 260
  • [24] An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Mahmood, Khalid
    Ahmad, Hafiz Farooq
    Khan, Muhammad Khurram
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5355 - 5373
  • [25] Hierarchical key assignment without public-key cryptography
    Lin, CH
    COMPUTERS & SECURITY, 2001, 20 (07) : 612 - 619
  • [26] An efficient key management scheme for user access control in outsourced databases
    Seungtae Hong
    Hyeong-Il Kim
    Jae-Woo Chang
    World Wide Web, 2017, 20 : 467 - 490
  • [27] An efficient key management scheme for user access control in outsourced databases
    Hong, Seungtae
    Kim, Hyeong-Il
    Chang, Jae-Woo
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2017, 20 (03): : 467 - 490
  • [28] Cryptographic key assignment scheme for dynamic access control in a user hierarchy
    Kuo, FH
    Shen, VRL
    Chen, TS
    Lai, F
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1999, 146 (05): : 235 - 240
  • [29] Public key versus symmetric key cryptography in client–server authentication protocols
    An Braeken
    International Journal of Information Security, 2022, 21 : 103 - 114
  • [30] Two integrated schemes of user authentication and access control in a distributed computer network
    Jan, JK
    Tseng, YM
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (06): : 419 - 424