Abstract:
A number of well-known authentication protocols are considered in the context of next-generation mobile and CE network services. The potential weaknesses of current proto...Show MoreMetadata
Abstract:
A number of well-known authentication protocols are considered in the context of next-generation mobile and CE network services. The potential weaknesses of current protocols can be overcome using Zero Knowledge Proof (ZKP) techniques to protect user passwords so an alternative ZKP protocol, SeDiCi 2.0, is described. This offers mutual and also two-factor authentication that is considered more secure against various phishing attempts than existing trusted third party protocols. The suitability of such a ZKP protocol for various CE-based cloud computing applications is demonstrated.
Date of Conference: 06-08 September 2011
Date Added to IEEE Xplore: 29 September 2011
ISBN Information:
ISSN Information:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Cloud Computing ,
- Authentication Protocol ,
- Zero-knowledge Proof ,
- Consumption Of Services ,
- Secret Key ,
- Virtual Machines ,
- Public Key ,
- Replay Attacks ,
- Cloud Infrastructure ,
- User Authentication ,
- Authentication Service ,
- Mutual Authentication ,
- Chosen-plaintext ,
- Trusted Third Party ,
- Identification Of Clients
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Cloud Computing ,
- Authentication Protocol ,
- Zero-knowledge Proof ,
- Consumption Of Services ,
- Secret Key ,
- Virtual Machines ,
- Public Key ,
- Replay Attacks ,
- Cloud Infrastructure ,
- User Authentication ,
- Authentication Service ,
- Mutual Authentication ,
- Chosen-plaintext ,
- Trusted Third Party ,
- Identification Of Clients
- Author Keywords