{"title":"使用智能设备的隐私保护认证系统","authors":"L. Malina, J. Hajny, Zdenek Martinasek","doi":"10.1109/TSP.2016.7760820","DOIUrl":null,"url":null,"abstract":"The paper deals with using modern smart handheld and wearable devices such as smartphones, smartwatches and microcomputers in privacy-preserving authentication and access control systems. Authentication and access control systems usually employ chip cards and smart cards as users' authentication devices. Nevertheless, current privacy-preserving authentication schemes often require more powerful devices such as smartphones and smartwatches. This paper provides the performance assessment of cryptographic and math methods on the smart devices. Further, a privacy-preserving authentication scheme is implemented in order to investigate its performance on these smart devices. Finally, the benefits and limits of deploying the smart devices in privacy preserving authentication systems are discussed.","PeriodicalId":159773,"journal":{"name":"2016 39th International Conference on Telecommunications and Signal Processing (TSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Privacy-preserving authentication systems using smart devices\",\"authors\":\"L. Malina, J. Hajny, Zdenek Martinasek\",\"doi\":\"10.1109/TSP.2016.7760820\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper deals with using modern smart handheld and wearable devices such as smartphones, smartwatches and microcomputers in privacy-preserving authentication and access control systems. Authentication and access control systems usually employ chip cards and smart cards as users' authentication devices. Nevertheless, current privacy-preserving authentication schemes often require more powerful devices such as smartphones and smartwatches. This paper provides the performance assessment of cryptographic and math methods on the smart devices. Further, a privacy-preserving authentication scheme is implemented in order to investigate its performance on these smart devices. Finally, the benefits and limits of deploying the smart devices in privacy preserving authentication systems are discussed.\",\"PeriodicalId\":159773,\"journal\":{\"name\":\"2016 39th International Conference on Telecommunications and Signal Processing (TSP)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-06-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 39th International Conference on Telecommunications and Signal Processing (TSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TSP.2016.7760820\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 39th International Conference on Telecommunications and Signal Processing (TSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TSP.2016.7760820","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy-preserving authentication systems using smart devices
The paper deals with using modern smart handheld and wearable devices such as smartphones, smartwatches and microcomputers in privacy-preserving authentication and access control systems. Authentication and access control systems usually employ chip cards and smart cards as users' authentication devices. Nevertheless, current privacy-preserving authentication schemes often require more powerful devices such as smartphones and smartwatches. This paper provides the performance assessment of cryptographic and math methods on the smart devices. Further, a privacy-preserving authentication scheme is implemented in order to investigate its performance on these smart devices. Finally, the benefits and limits of deploying the smart devices in privacy preserving authentication systems are discussed.