Authentication for Computer Communication > An Overview of Authentication for Computer Communications

2019 ◽  
Author(s):  
Madhusudhana H. S.

Authentication is the first and foremost security principle that involves validation of identity of an user or a machine. The successful authentication is required for authorization and secure data exchanges. A common classification of authentication system based on factors – something you know, something you own, something you did and something you are – is explained. Well-known and used password schemes employed in practice is described along with standards. A description Kerberos of authentication system based on symmetric key encryption and SSL based authentication which is based on public key encryption is given. Related Single-Sign-On technologies are explained. A brief overview of authentication for cloud computing, IoT and UIDAI is presented.

2019 ◽  
Vol 2019 ◽  
pp. 1-16 ◽  
Author(s):  
Binrui Zhu ◽  
Jiameng Sun ◽  
Jing Qin ◽  
Jixin Ma

The cloud-assisted Internet of Things (CIoT) is booming, which utilizes powerful data processing capabilities of the cloud platform to solve massive Internet of Things (IoT) data. However, the CIoT faces new security challenges, such as the confidentiality of the outsourced data. Data encryption is a fundamental technique that can guarantee the confidentiality of outsourced data, but it limits target encrypted data retrieval from cloud platform. Public key encryption with keyword search (PEKS) provides a promising solution to address this problem. In PEKS, a cloud server can be authorized to search the keyword in encrypted documents and retrieve associated encrypted documents for the receiver. However, most existing PEKS schemes merely focus on keyword search function while ignoring the associated documents encryption/decryption function. Thus, in practice, a PEKS scheme must cooperate with another separated public key encryption (PKE) scheme to fulfill a completely secure data sharing scheme. To address this problem, in this paper, we propose a secure data sharing scheme with designated server that combines PKE scheme with PEKS scheme, which provides both keyword search and documents encryption/decryption functions. Furthermore, only the designated server can search the keyword via encrypted documents for enhanced security in our work. Moreover, our scheme also satisfies the public verifiability of search results, which includes both keywords and documents ciphertexts’ correctness and integrity. As to the security, our scheme provides stronger indistinguishability security of document and keyword in the proposed security model.


2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
Jong Min Kim ◽  
Hong Sub Lee ◽  
Junmin Yi ◽  
Minho Park

Basic security of data transmission in battery-powered wireless sensor networks (WSNs) is typically achieved by symmetric-key encryption, which uses little energy; but solar-powered WSNs sometimes have sufficient energy to achieve a higher level of security through public-key encryption. However, if energy input and usage are not balanced, nodes may black out. By switching between symmetric-key and public-key encryption, based on an energy threshold, the level of security can be traded off against the urgency of energy-saving. This policy can also reduce the amount of energy used by some nodes in a WSN, since data encrypted using a public-key is simply relayed by intermediate nodes, whereas data encrypted using a symmetric-key must be decrypted and reencrypted in every node on its path. Through a simulation, we compared the use of either symmetric-key or public-key encryption alone with our scheme, which was shown to be more secure, to use energy more effectively, and to reduce the occurrence of node blackouts.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 152551-152564
Author(s):  
Raylin Tso ◽  
Kaibin Huang ◽  
Yu-Chi Chen ◽  
Sk Md Mizanur Rahman ◽  
Tsu-Yang Wu

Author(s):  
L houssain El Fadil ◽  
Abdelkader MOUMEN ◽  
Mohamed BOUYE

Multi-receiver encryption enables a sender to encrypt a message and transmit the ciphertext to a set of authorized users, while no one out this group of authorized users can decrypt the message. Multi-receiver encryption is of great importance in many sectors such as broadcast communication, cloud computing, wireless communications, networking applications, e-voting, lottery, and medical applications. This paper proposes an efficient multi-receiver public key encryption scheme based on Lucas sequences. The results of the computational analysis show that, projected scheme is better against renown attacks and prevailing anonymous multireceiver algorithms


2021 ◽  
Author(s):  
Herlino Nanang ◽  
Yusuf Durachman ◽  
Ahmad F Misman ◽  
Zahidah Zulkifli ◽  
Husni Teja Sukmana

2014 ◽  
Vol 926-930 ◽  
pp. 2245-2248
Author(s):  
Li Jia

According to the single sign-on authentication mode, cloud computing unified login authentication method was put forward, and point set topology changing method was used for generating fractal random key, improved login authentication safety grade. Firstly, analyzed cloud computing login authentication system structure, and then used network public databases of fingerprint image as an example do fractal changes ring operation, generated a pseudo-random sequence, then the sequence encrypted and sent to the server for authentication through UDP. Lastly, made a simulation example.


Sign in / Sign up

Export Citation Format

Share Document