An integrated user authentication and access control scheme without public key cryptography

被引:0
|
作者
Chien, HY [1 ]
Jan, JK [1 ]
机构
[1] ChaoYang Univ Technol, Dept Informat Management, Taichung 413, Taiwan
来源
37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS | 2003年
关键词
cryptography; authentication; access control; public key; hashing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Conventionally, user authentication and access control are two separate security mechanisms in many distributed systems. An integrated design of user authentication and access control may provide better performance in terms of security and computational complexity. This paper discusses the pros and cons of the separate approach and the integrated approach, and then proposes a new integrated scheme without using public key cryptography. The new scheme has several practical merits - no user-sensitive data stored on the server, no storage for access list or capability list on the server, extreme low computational cost, the freedom of choosing users' passwords, and mutual authentication.
引用
收藏
页码:137 / 143
页数:7
相关论文
共 50 条
  • [31] Security of the Jan-Tseng integrated schemes for user authentication and access control
    He, WH
    Wu, TC
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2000, 147 (05): : 365 - 368
  • [32] Integrated security for data transfer and access control using authentication and cryptography technique for Internet of things
    Sharma, Santosh Kumar
    Khuntia, Bonomali
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2020, 24 (04) : 303 - 309
  • [33] Public key authentication scheme over quaternions
    Valluri, Maheswara Rao
    Narayan, Shailendra Vikash
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (01): : 169 - 181
  • [34] A SECURE PUBLIC-KEY AUTHENTICATION SCHEME
    GALIL, Z
    HABER, S
    YUNG, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 3 - 15
  • [35] An improved remote user authentication scheme with key agreement
    Kumari, Saru
    Khan, Muhammad Khurram
    Li, Xiong
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1997 - 2012
  • [36] Cryptanalysis of Remote User Authentication Scheme with key agreement
    Madhusudan, R.
    Valiveti, Annapurna
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015,
  • [37] An Improved User Authentication and Key Agreement Scheme Providing User Anonymity
    Ya-Fen Chang and Pei-Yu Chang Department of Computer Science and Information Engineering
    Journal of Electronic Science and Technology, 2011, 9 (04) : 352 - 358
  • [38] A Secure Access Authentication Scheme for Multiserver Environments using Neural Cryptography
    Pattanayak, Sayantica
    Ludwig, Simone A.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2018, 13 (01): : 56 - 65
  • [39] A key distribution scheme based on public key cryptography for sensor networks
    Li, Xiaolong
    Lin, Yaping
    Yang, Siqing
    Yi, Yeqing
    Yu, Jianping
    Lu, Xinguo
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 725 - +
  • [40] An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs
    Jiang, Peng
    Wen, Qiaoyan
    Li, Wenmin
    Jin, Zhengping
    Zhang, Hua
    SCIENTIFIC WORLD JOURNAL, 2013,