Research on Digital Encryption Security Information System Based on Identity Authentication

被引:0
|
作者
Bu, Xu [1 ]
机构
[1] Guangzhou Nanyang Polytech Coll, Sch Informat Engn, Guangzhou 510925, Guangdong, Peoples R China
关键词
Identification Certification; Key Combination; Management System; Network Transactions;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
In order to solve the problems existing in the current authentication system, a new authentication system scheme is proposed. The user identity is used as a key production factor by using the CPK (Combined Public Key) combined public key system. From the perspective of security design, and combining the theory of CPK combined public key system, the overall design framework of CPK key management system is proposed. According to the functional requirements of the system, the main modules of the system are divided, and its main functions are stipulated. The system uses a secure authentication card as the only identity of the user. The authentication card has a certain computing ability and safe storage space. It realizes the secure storage of the user's key. Finally, from actual application scenario, the data flow of the user in the process of registration and use in the system is given. The main modules of the system are tested successfully through the security authentication card.
引用
收藏
页码:175 / 178
页数:4
相关论文
共 50 条
  • [1] New Authentication Algorithm Based on Verifiable Encryption with Digital Identity
    Kihara, Maki
    Iriyama, Satoshi
    CRYPTOGRAPHY, 2019, 3 (03) : 1 - 18
  • [2] The Research of Output and Authentication Methods of Digital Bills Based on the Fusion of Identity Information
    Hong, Wang
    Jie, Kong
    2014 Fifth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA), 2014, : 1084 - 1088
  • [3] Anonymous security authentication protocol based on identity encryption for cyber-physical power system
    Li, Xue
    Chen, Jiale
    Jiang, Cheng
    Du, Dajun
    Zhu, Yongsheng
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2023,
  • [4] Research of Security Identity Authentication Based on Campus Network
    Guo Zhenghui
    Han Xiujuan
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 333 - 335
  • [5] File Encryption System Design Based on USB Identity Authentication
    Li, Ping
    Li, Li
    Liang, YunJuan
    Zhang, LiJun
    2011 SECOND ETP/IITA CONFERENCE ON TELECOMMUNICATION AND INFORMATION (TEIN 2011), VOL 1, 2011, : 60 - 62
  • [6] Identity-based encryption: A new technology for information security
    Xu Yixian
    Gao Qiang
    Wu Jiang
    ICCSE'2006: Proceedings of the First International Conference on Computer Science & Education: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2006, : 561 - 564
  • [7] Research on Network Security and Identity Authentication
    Meng, Jin
    Zhao, Jing
    Xing, Ming-shun
    Ma, Tie
    Zhao, Hai-yan
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 280 - 283
  • [8] Research on the security of information system authentication scheme based on the fuzzy number intuitionistic fuzzy information
    Wang, Yajie
    Yu, Huan
    Shi, Feng
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (02) : 1629 - 1637
  • [9] Research and implementation of grid security mode based on identity authentication
    Li, Ma
    Zheng Weimin
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 499 - 503
  • [10] AUTHENTICATION AND ENCRYPTION FOR MEDICAL IMAGE SECURITY SYSTEM
    Kannammal, A.
    Rani, S. Subha
    INTERNATIONAL JOURNAL OF ROBOTICS & AUTOMATION, 2014, 29 (04): : 448 - 455