{"title":"Secure System Logon Based on IBC and Mobile Terminal","authors":"Y. Liu, Yihong Long, Xu Zhou, Fen Li","doi":"10.1109/CIS.2017.00130","DOIUrl":null,"url":null,"abstract":"Password-based authentication is widely used due to its simplicity but it is not secure. Systems with high security requirements often employ public key infrastructure (PKI) technology, but PKI is complex and requires users to perform certificate related operations manually. Furthermore, it requires portable cryptographic hardware devices such USB keys to secure the users' private keys and to perform the cryptographic operations. This imposes additional costs on the users, and these devices may not work in some cases such as when the USB ports of a computer are sealed or removed due to security consideration. To address these issues, we propose a secure system logon approach based on identity based cryptography (IBC) and mobile terminal, with three different schemes, and analyze the advantages of the proposed schemes. The approach presented is promising.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 13th International Conference on Computational Intelligence and Security (CIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2017.00130","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Password-based authentication is widely used due to its simplicity but it is not secure. Systems with high security requirements often employ public key infrastructure (PKI) technology, but PKI is complex and requires users to perform certificate related operations manually. Furthermore, it requires portable cryptographic hardware devices such USB keys to secure the users' private keys and to perform the cryptographic operations. This imposes additional costs on the users, and these devices may not work in some cases such as when the USB ports of a computer are sealed or removed due to security consideration. To address these issues, we propose a secure system logon approach based on identity based cryptography (IBC) and mobile terminal, with three different schemes, and analyze the advantages of the proposed schemes. The approach presented is promising.