2014
DOI: 10.4236/jcc.2014.24005
|View full text |Cite
|
Sign up to set email alerts
|

Identity Authentication Based on Two-Beam Interference

Abstract: A two-factor identity authentication method on the basis of two-beam interference was presented. While verifying a user's identity, a specific "phase key" as well as a corresponding "phase lock" are both mandatory required for a successful authentication. Note that this scheme can not only check the legality of the users, but also verify their identity levels so as to grant them hierarchical access permissions to various resources of the protected systems or organizations. The authentication process is straigh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…However, the inherent silhouette problem [22][23][24][25][26][27][28][29][30] caused by the equipollent natures of the POMs makes IBE fragile. Different enhanced IBE methods [22][23][24][25][26][27][28][29][30][31][32][33][34] have been put forward to eliminate the silhouette problem. For example, Zhang et al [22] interchanged the corresponding parts of the two POMs randomly.…”
Section: Introductionmentioning
confidence: 99%
“…However, the inherent silhouette problem [22][23][24][25][26][27][28][29][30] caused by the equipollent natures of the POMs makes IBE fragile. Different enhanced IBE methods [22][23][24][25][26][27][28][29][30][31][32][33][34] have been put forward to eliminate the silhouette problem. For example, Zhang et al [22] interchanged the corresponding parts of the two POMs randomly.…”
Section: Introductionmentioning
confidence: 99%