An Adaptive Two-Factor Authentication Scheme Based on the Usage of Schnorr Signcryption Algorithm

نویسندگان

چکیده

With the current continuous increase in usage of communication technologies and data transmission amount, available web services mobile applications are used to access complete several online activities such as education, e-commerce, financial transactions. The needs for a strong secure control authentication solution users’ resources crucial. Authentication can play major rule protection by implementing solution, which allows users prove their identities provide permission all legitimate only. This paper proposes two-factor scheme based on modified copy Schnorr Signcryption algorithm. proposed achieves target goal this paper, provides with an efficient that be implemented any second factor, no special requirement authenticate recourses permission. Moreover, Java-based application is developed order examine client/server architecture where it found successfully authorised reject unauthorised request adequate security level acceptable performance.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Signcryption scheme based on schnorr digital signature

This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based o...

متن کامل

Schnorr Digital Signature in Signcryption Scheme

This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElG...

متن کامل

On the Authentication of One Popular Signcryption Scheme

Whether a recipient can prove a signature to others is of great importance. The function is just one reason that we call a signature “signature” rather than others. In this paper, we point out that one popular signcryption signature convinces only the designated document’s recipient that the signer deliberately signed the document. The designated recipient can check the validity of a given sign...

متن کامل

Gaithashing: A two-factor authentication scheme based on gait features

Recently, gait recognition has attracted much attention as a biometric feature for real-time person authentication. The main advantage of gait is that it can be observed at a distance in an unobtrusive manner. However, the security of an authentication system, based only on gait features, can be easily broken. A malicious actor can observe the gait of an unsuspicious person and extract the rela...

متن کامل

An efficient certificateless signcryption scheme in the standard model

Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Informatica

سال: 2023

ISSN: ['0350-5596', '1854-3871']

DOI: https://doi.org/10.31449/inf.v47i5.4627