Double-way authentication access control scheme based on Harn's digital signature

被引:0
|
作者
Shi, R.H. [1 ]
机构
[1] Dept. of Comp. Sci. and Technol., Central South Univ., Changsha 410075, China
来源
关键词
Computation complexity - Discrete logarithm problem - Double way authentication - Dynamic access control - Harn's digital signature - Information bodies - Information protection system - Zero knowledge proof;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:400 / 404
相关论文
共 50 条
  • [21] A digital signature mechanism and authentication scheme for group communication in grid
    Li, Yunfa
    Jin, Hai
    Zou, Deqing
    Chen, Jieyun
    Han, Zongfen
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 42 - +
  • [22] Generalized Elliptic Curve Digital Signature Chain based Authentication and Key Agreement Scheme
    Zhang Li-hua
    Zhang Li-ping
    Bai Er-fei
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 1503 - +
  • [23] A Secure Authentication and Access Control Scheme for CoAP-based IoT
    Obaidat, Muath A.
    Choong, Jian Lim
    Thakur, Kutub
    2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2022, : 145 - 149
  • [24] Integrated authentication and access control scheme based on gene-certificate
    Sun, F. X.
    Cheng, S. H.
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 128 - 133
  • [25] Authentication-doubled access control scheme based on compound problem
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 19 (07): : 49 - 52
  • [26] PAAS: PMIPv6 Access Authentication Scheme Based on Identity-Based Signature in VANETs
    Gao, Tianhan
    Deng, Xinyang
    Wang, Yingbo
    Kong, Xiangjie
    IEEE ACCESS, 2018, 6 : 37480 - 37492
  • [27] AN AUTHENTICATION-COMBINED ACCESS-CONTROL SCHEME USING A ONE-WAY FUNCTION
    WU, TC
    CHANG, CC
    YEH, YS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1994, 27 (05) : 63 - 70
  • [28] Knapsack based ECC for digital signature authentication
    Rajaram, R.
    Prabakar, M. Amutha
    Devi, M. Indra
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 3 (04) : 384 - 392
  • [29] A Visualization Based Approach for Digital Signature Authentication
    Xu, Songhua
    Yang, Wenxia
    Lau, Francis C. M.
    COMPUTER GRAPHICS FORUM, 2009, 28 (03) : 935 - 942
  • [30] A group signature scheme for the database access control
    Mu, HB
    Liu, Y
    ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 8, 2005, : 502 - 506