Cart (Loading....) | Create Account
Close category search window
 

Authentication based on Euclidean geometry properties

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Li-na Ge ; Sch. of Comput. Sci. & Eng., South China Univ. of Technol., Guangzhou ; Shao-hua Tang

A user authentication scheme based upon the properties of Euclidean geometry properties is proposed. The center authority (CA) constructs the shared information by using both its secret and the userpsilas password in the user registration phase. Then the request message is computed by using both the userpsilas password and the registered information based on properties of Euclidean geometry and one-way hash functions. In the system verification phase, the CA verifies the validity of a user based on its request message and the CApsilas secrets. Only the CA can do the verification because only it knows its secret. The verification is fast because it does not need to access the database and its computation is simple. The timestamp allows the proposed scheme to withstand replay attacks. The security analysis shows that our scheme is also secure against eavesdropping attacks, and dictionary attacks. A formal approach is adopted to prove the proposed scheme is secure. The experimental results show that our scheme is more applicable for large-scale network environments than a password-based system or a PKI certificate-based system.

Published in:

Anti-counterfeiting, Security and Identification, 2008. ASID 2008. 2nd International Conference on

Date of Conference:

20-23 Aug. 2008

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.