A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption

Author(s):  
Liang Li ◽  
Wei-Qiang Jiang ◽  
Jie Tian ◽  
Yi-Xian Yang ◽  
Cai-Ping Jiang ◽  
...  
2013 ◽  
Vol 411-414 ◽  
pp. 166-171 ◽  
Author(s):  
Shi Zhun Jia ◽  
Jun Lin ◽  
Xiao Rong Feng

With the development of mobile Internet, security problems have been greatly concerned. Identity authentication can be considered as the most basic one among various security problems. This paper proposed an improved identity authentication scheme based on dynamic password, where the idea of identity-based encryption and signature has been introduced in to ensure higher security level.


2010 ◽  
Vol 21 (06) ◽  
pp. 1049-1063 ◽  
Author(s):  
YANLI REN ◽  
DAWU GU ◽  
SHUOZHONG WANG ◽  
XINPENGU ZHANG

In a proxy re-encryption scheme, a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in public key settings. Hierarchical identity-based cryptography is a generalization of identity-based encryption that mirrors an organizational hierarchy, which allows a root private key generator to distribute the workload by delegating private key generation and identity authentication to lower-level private key generators. In this paper, we propose a hierarchical identity-based proxy re-encryption (HIBPRE) scheme which achieves IND-PrID-CCA2 security without random oracles. This is the first HIBPRE scheme up to now, and our scheme satisfies unidirectionality, non-interactivity and permits multiple re-encryptions.


2013 ◽  
Vol 756-759 ◽  
pp. 837-840 ◽  
Author(s):  
Sheng Chang Guo ◽  
Yi Liu ◽  
Jie Ling

This paper draws on the principle of identity-based public key encryption (IBE) system algorithm. A suitable Identity authentication scheme for cloud computing environment is proposed. Security analysis of the scheme is given. The proposed scheme using the bidirectional signature between Client and cloud server has solved the safety verification audit, and realized identity authentication in cloud computing. We provide end-to-end authentication instead of trusted third party, which solve the problem of Key Escrow and improve the efficiency of the management of the identity authentication.


Author(s):  
Wei-qiang JIANG ◽  
Zheng-quan HUANG ◽  
Yi-xian YANG ◽  
Jie TIAN ◽  
Liang LI

Author(s):  
Jae Hong SEO ◽  
Tetsutaro KOBAYASHI ◽  
Miyako OHKUBO ◽  
Koutarou SUZUKI

2021 ◽  
Vol 1812 (1) ◽  
pp. 012027
Author(s):  
Wanli Ma ◽  
Qi Zhang ◽  
Junwei Ma ◽  
Honglin Xue ◽  
Xiaowei Hao ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document