scholarly journals Dual factor third‐party biometric‐based authentication scheme using quantum one time passwords †

2020 ◽  
Vol 3 (6) ◽  
Author(s):  
Mohit Kumar Sharma ◽  
Manisha J. Nene
Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 634 ◽  
Author(s):  
Xudong Jia ◽  
Ning Hu ◽  
Shen Su ◽  
Shi Yin ◽  
Yan Zhao ◽  
...  

The incredible development of Internet of things technology promotes the integration of application systems, which enable people to enjoy the convenience of multiple application services through a single intelligent device or terminal. In order to implement value exchange and information sharing between different applications, cross-domain access is inevitable. In order to prevent illegal access, identity authentication is necessary before the terminal accesses the service. Because of the need to introduce a trusted third party, the traditional centralized authentication model not only destroys the autonomy and flexibility of the application system, but also causes issues such as single point of failure and hidden dangers of unilateral control. This paper proposes an identity-based cross-domain authentication scheme for the Internet of Things. This scheme uses the Blockchain as a decentralized trust anchor instead of the traditional certificate of authority, and uses the identity-based self-authentication algorithm to replace the traditional PKI authentication algorithm. The scheme proposed in this paper implements a decentralized authentication model, which can guarantee the autonomy and initiative of the security domain.


2018 ◽  
Vol 15 (5) ◽  
pp. 824-839 ◽  
Author(s):  
Santanu Chatterjee ◽  
Sandip Roy ◽  
Ashok Kumar Das ◽  
Samiran Chattopadhyay ◽  
Neeraj Kumar ◽  
...  

2016 ◽  
Vol 74 (8) ◽  
pp. 3685-3703 ◽  
Author(s):  
Imran Khan ◽  
Shehzad Ashraf Chaudhry ◽  
Muhammad Sher ◽  
Javed I. Khan ◽  
Muhammad Khurram Khan

2016 ◽  
Vol 66 (6) ◽  
pp. 590
Author(s):  
P. Kumaraswamy ◽  
C.V. Guru Rao ◽  
V. Janaki ◽  
K.V.T.K.N. Prashanth

<p>Public key cryptosystems are secure only when the authenticity of the public key is assured. Shao proposed<br />a new scheme to overcome the problems of the existing schemes, which suffers from two major drawbacks. The<br />first drawback is the availability of users’ passwords in plaintext format in key server which are prone to attacks<br />by ill-minded users. The second one is depending on the key server blindly for certificate generation, without<br />further verification by the user. To overcome these severe drawbacks, we proposed an improved key authentication<br />scheme based on Chinese remainder theorem and discrete logarithms. Our scheme allows the user to generate his/<br />her certificate without the help of any trusted third party. This scheme is intended for online services, military and<br />defense applications to exchange keys securely.<br /> </p>


Sign in / Sign up

Export Citation Format

Share Document