2022
DOI: 10.5486/pmd.2022.suppl.1
|View full text |Cite
|
Sign up to set email alerts
|

Provably secure identity-based remote password registration

Abstract: One of the most significant challenges is the secure user authentication. If it becomes breached, confidentiality and integrity of the data or services may be compromised. The most widespread solution for entity authentication is the passwordbased scheme. It is easy to use and deploy. During password registration typically users create or activate their account along with their password through their verification email, and service providers are authenticated based on their Secure Sockets Layer / Transport Lay… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…However, given the rapid development of computing capabilities, the total accuracy reaches 89.25 %, which does not allow timely response to targeted threats. In order to provide the authenticity service, it is proposed in [13] to use a secure blind registration protocol without certificates (Cumulative Layout Shift, CLS-BPR) instead of certificates transmitted based on the SSL/TLS protocol. This protocol is a password registration scheme based on identity-based cryptography, i.e.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…However, given the rapid development of computing capabilities, the total accuracy reaches 89.25 %, which does not allow timely response to targeted threats. In order to provide the authenticity service, it is proposed in [13] to use a secure blind registration protocol without certificates (Cumulative Layout Shift, CLS-BPR) instead of certificates transmitted based on the SSL/TLS protocol. This protocol is a password registration scheme based on identity-based cryptography, i.e.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…SSL cryptographic protocols and TLS transport layer security provide data encryption and authentication between various homogeneous and heterogeneous devices such as servers, computers and software applications running across the network. In smart technologies, the use of the SSL/TLS protocol stack is integrated with blockchain technology, as well as with the EDS Elliptic Curve Digital Signature Algorithm (ECDSA) based on elliptic curves, which will ensure system security until the post-quantum period [3,10,[12][13][14][15][16]. However, the use of such an approach is associated with an increase in the energy intensity of the protocol and the need to take into account the hardware characteristics of the physical environment of cyber-physical systems [3,7,9].…”
Section: Introductionmentioning
confidence: 99%