Paper Title:
Design and Research of Online Authentication Based on Conic Curves
  Abstract

The rapid development of Internet is pushing the e-Business to go to the front stage. Online authentication involves much more than the obvious identification and validation problem. We present here a comprehensive framework for online authentication which has several important practical benefits. Our distributed E-Business authentication scheme based on conic curve is proposed. This scheme is composed of three parts, constructing license and validating license. Because the security of license is determined by private key, not the arithmetic itself, user can not construct new license by given license and the public key as long as the private key is not leaked. Since encoding and decoding over conic are easily implement on conic curves, it has enabled our scheme to greatly enhance efficiency. We also analysis its security. The entire process guarantees the security and reliability.

  Info
Periodical
Key Engineering Materials (Volumes 480-481)
Edited by
Yanwen Wu
Pages
1598-1602
DOI
10.4028/www.scientific.net/KEM.480-481.1598
Citation
X. X. Song, Z. G. Chen, "Design and Research of Online Authentication Based on Conic Curves", Key Engineering Materials, Vols. 480-481, pp. 1598-1602, 2011
Online since
June 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Jie Qiong Lin, Jin Song Yang, Ming Ming Lu
Chapter 3: Materials Forming, Machining and Joining
Abstract:To solve the best-fit sphere (BFS) accurately is one of the technological keys for the generating and testing of optical aspherical surfaces....
1472
Authors: Yong Luo
Chapter 5: Information and Computer Science
Abstract:The result of null testing is usually used as the criterion in the fabricating process of aspheric mirrors. To ensure the accuracy of...
1363
Authors: C. Zhao, Mao Li Fu, J.T. Cheng
Chapter 2: Advanced Material and Manufacturing Technologies
Abstract:This paper presents an operator that fitting the parameters of ellipses features, and improves the computational efficiency. Based on the...
80
Authors: Guang Ya Li
Chapter 8: Information Computing and Networks
Abstract:The most important and concerned problem with the Internet electronic registration is security problem. This contribution uses conic curve...
546