{"title":"Efficient anonymous user authentication on server without secure channel during registration","authors":"An Braeken, A. Touhafi","doi":"10.1109/CLOUDTECH.2016.7847702","DOIUrl":null,"url":null,"abstract":"Cloud computing offers a simple way to provide access to servers, storage, databases and a broad set of application services over the Internet. Its popularity is growing spectacularly. Consequently, there is a need for strong authentication schemes, offering besides privacy also anonymity to the users during these actions. Therefore, this paper presents two userfriendly authentication protocols, able to derive the required security material at user side without the need of a secure channel between user and registration center. The second protocol has the added functionality to guarantee unforgeability and non repudiation of the request. Simple elliptic curve operations, together with hashes and symmetric key encryption algorithms are used. The proposed protocols are two-factor based, requiring password and smartphone, and are very efficient to be executed on the smartphone due to a small amount of computations.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CLOUDTECH.2016.7847702","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Cloud computing offers a simple way to provide access to servers, storage, databases and a broad set of application services over the Internet. Its popularity is growing spectacularly. Consequently, there is a need for strong authentication schemes, offering besides privacy also anonymity to the users during these actions. Therefore, this paper presents two userfriendly authentication protocols, able to derive the required security material at user side without the need of a secure channel between user and registration center. The second protocol has the added functionality to guarantee unforgeability and non repudiation of the request. Simple elliptic curve operations, together with hashes and symmetric key encryption algorithms are used. The proposed protocols are two-factor based, requiring password and smartphone, and are very efficient to be executed on the smartphone due to a small amount of computations.