Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A Personal Privacy-Ensured User Authentication Scheme

View through CrossRef
User authentication verifies the legitimacy of users and prevents service providers from offering services to unauthorized parties. The concept is widely applied in various scenarios, including everyday access control systems and IoT applications. With growing concerns about personal privacy, ensuring user anonymity has become increasingly important. In addition to privacy, user convenience is also a key factor influencing the willingness to adopt a system. To address these concerns, we propose a user authentication scheme that ensures personal privacy. The system consists of a backend server, multiple users, and multiple control units. Each user is issued or equipped with an authentication unit. An authorized user can be authenticated by a control unit, with assistance from the backend server, without revealing their identity to the control unit. The scheme is suitable for applications requiring privacy-preserving authentication. Furthermore, to enhance generality, the proposed design ensures computational efficiency and allows the authentication unit to adapt to specific application requirements.
Title: A Personal Privacy-Ensured User Authentication Scheme
Description:
User authentication verifies the legitimacy of users and prevents service providers from offering services to unauthorized parties.
The concept is widely applied in various scenarios, including everyday access control systems and IoT applications.
With growing concerns about personal privacy, ensuring user anonymity has become increasingly important.
In addition to privacy, user convenience is also a key factor influencing the willingness to adopt a system.
To address these concerns, we propose a user authentication scheme that ensures personal privacy.
The system consists of a backend server, multiple users, and multiple control units.
Each user is issued or equipped with an authentication unit.
An authorized user can be authenticated by a control unit, with assistance from the backend server, without revealing their identity to the control unit.
The scheme is suitable for applications requiring privacy-preserving authentication.
Furthermore, to enhance generality, the proposed design ensures computational efficiency and allows the authentication unit to adapt to specific application requirements.

Related Results

An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Abstract Fin-Tech is the merging of finance and technology to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech i...
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
Smart Chatbot for User Authentication
Smart Chatbot for User Authentication
Despite being the most widely used authentication mechanism, password-based authentication is not very secure, being easily guessed or brute-forced. To address this, many systems w...
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA
As many vulnerabilities of one-time authentication systems have already been uncovered, there is a growing need and trend to adopt continuous authentication ...

Back to Top