Design and Research of Online Authentication Based on Conic Curves

Article Preview

Abstract:

The rapid development of Internet is pushing the e-Business to go to the front stage. Online authentication involves much more than the obvious identification and validation problem. We present here a comprehensive framework for online authentication which has several important practical benefits. Our distributed E-Business authentication scheme based on conic curve is proposed. This scheme is composed of three parts, constructing license and validating license. Because the security of license is determined by private key, not the arithmetic itself, user can not construct new license by given license and the public key as long as the private key is not leaked. Since encoding and decoding over conic are easily implement on conic curves, it has enabled our scheme to greatly enhance efficiency. We also analysis its security. The entire process guarantees the security and reliability.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 480-481)

Pages:

1598-1602

Citation:

Online since:

June 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Steve Burnett, Stephen Paine., in: RSA Security's Official Guide to Cryptography, edited by Graw-Hill Education ( 2001).

Google Scholar

[2] W. Diffie, M.E. Hellman: IEEE Transactions on Information Theory, Vol. 22(1976), p.644.

Google Scholar

[3] Pascal Paillier: RSA Laboratories Cryptobytes, Vol. 5(2002), p.20.

Google Scholar

[4] M. Zhang: Journal of Sichuan University (Natural Science), Vol. 33(1996), p.356.

Google Scholar

[5] Z. Cao, in: Advances in Cryptology: Chinacrypt98, edited by Science Press(1998).

Google Scholar

[6] Z. Cao: Journal of Naturul Science of Heilongjiang University, Vol. 16(1999), p.15.

Google Scholar

[7] Z. Dai, D. Pei, J. Yang, in: CrypTEC99, edited by S IEEE Computer Society(1999).

Google Scholar