http://scholars.ntou.edu.tw/handle/123456789/16620
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Han-Yu Lin | en_US |
dc.contributor.author | Pei-Yih Ting | en_US |
dc.contributor.author | Hong-Ru Wu | en_US |
dc.date.accessioned | 2021-04-22T03:00:48Z | - |
dc.date.available | 2021-04-22T03:00:48Z | - |
dc.date.issued | 2019-11-09 | - |
dc.identifier.isbn | 978-1-4503-7180-3 | - |
dc.identifier.uri | http://scholars.ntou.edu.tw/handle/123456789/16620 | - |
dc.description | 舉辦地點:Tokyo Japan | en_US |
dc.description.abstract | Remote user authentication scheme is an important technique for securely accessing the resources of servers. Traditionally, password-based authentication schemes are commonly adopted mechanisms, i.e., a user first chooses a password and then registers to the server for becoming a legitimate member. Nevertheless, such schemes are vulnerable to password guessing attacks and a remote server might have to maintain a password table for verifying users. In recent years, attribute-based cryptosystems have been received much attention. An attribute-based authentication scheme allows a remote system to verify a user's membership according to his/her owned attribute sets without using passwords. In 2015, Yun et al. proposed an improved attribute-based authentication protocol by utilizing Shamir's secret sharing technique. Their protocol is secure against man-in-the-middle, replay and collusion attacks. However, we find out that their scheme only achieves one-way authentication rather than mutual authentication. In this paper, we extend their work to further fulfill the crucial property of mutual authentication. Moreover, we incorporate the concept of time-bounded keys into the extended variant for providing more flexible applications in the real world. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Association for Computing Machinery | en_US |
dc.relation.ispartof | ICTCE '19: Proceedings of the 3rd International Conference on Telecommunications and Communication Engineering | en_US |
dc.title | An Attribute-Based Mutual Authentication Scheme with Time-Bounded Keys | en_US |
dc.type | conference paper | en_US |
dc.relation.conference | ICTCE 2019: 2019 The 3rd International Conference on Telecommunications and Communication Engineering | en_US |
dc.identifier.doi | https://doi.org/10.1145/3369555.3369568 | - |
dc.relation.pages | 75–79 | en_US |
item.cerifentitytype | Publications | - |
item.openairetype | conference paper | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
item.fulltext | no fulltext | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
crisitem.author.dept | College of Electrical Engineering and Computer Science | - |
crisitem.author.dept | Department of Computer Science and Engineering | - |
crisitem.author.dept | National Taiwan Ocean University,NTOU | - |
crisitem.author.dept | College of Electrical Engineering and Computer Science | - |
crisitem.author.dept | Department of Computer Science and Engineering | - |
crisitem.author.dept | National Taiwan Ocean University,NTOU | - |
crisitem.author.parentorg | National Taiwan Ocean University,NTOU | - |
crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
crisitem.author.parentorg | National Taiwan Ocean University,NTOU | - |
crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
顯示於: | 資訊工程學系 |
在 IR 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。