An Adaptive Two-Factor Authentication Scheme Based on the Usage of Schnorr Signcryption Algorithm
نویسندگان
چکیده
With the current continuous increase in usage of communication technologies and data transmission amount, available web services mobile applications are used to access complete several online activities such as education, e-commerce, financial transactions. The needs for a strong secure control authentication solution users’ resources crucial. Authentication can play major rule protection by implementing solution, which allows users prove their identities provide permission all legitimate only. This paper proposes two-factor scheme based on modified copy Schnorr Signcryption algorithm. proposed achieves target goal this paper, provides with an efficient that be implemented any second factor, no special requirement authenticate recourses permission. Moreover, Java-based application is developed order examine client/server architecture where it found successfully authorised reject unauthorised request adequate security level acceptable performance.
منابع مشابه
Signcryption scheme based on schnorr digital signature
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based o...
متن کاملSchnorr Digital Signature in Signcryption Scheme
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElG...
متن کاملOn the Authentication of One Popular Signcryption Scheme
Whether a recipient can prove a signature to others is of great importance. The function is just one reason that we call a signature “signature” rather than others. In this paper, we point out that one popular signcryption signature convinces only the designated document’s recipient that the signer deliberately signed the document. The designated recipient can check the validity of a given sign...
متن کاملGaithashing: A two-factor authentication scheme based on gait features
Recently, gait recognition has attracted much attention as a biometric feature for real-time person authentication. The main advantage of gait is that it can be observed at a distance in an unobtrusive manner. However, the security of an authentication system, based only on gait features, can be easily broken. A malicious actor can observe the gait of an unsuspicious person and extract the rela...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Informatica
سال: 2023
ISSN: ['0350-5596', '1854-3871']
DOI: https://doi.org/10.31449/inf.v47i5.4627