Offline User Authentication Ensuring Non-Repudiation and Anonymity

User authentication is the key to ensuring that only authorized users can deal with specific affairs and access services. Applications or systems possessing different properties or requirements need different authentication schemes. For example, some institutions or companies need executives to mana...

Full description

Bibliographic Details
Main Authors: Ya-Fen Chang, Wei-Liang Tai, Ka-Ho Fung
Format: Article
Language:English
Published: MDPI AG 2022-12-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/22/24/9673
_version_ 1797455373915914240
author Ya-Fen Chang
Wei-Liang Tai
Ka-Ho Fung
author_facet Ya-Fen Chang
Wei-Liang Tai
Ka-Ho Fung
author_sort Ya-Fen Chang
collection DOAJ
description User authentication is the key to ensuring that only authorized users can deal with specific affairs and access services. Applications or systems possessing different properties or requirements need different authentication schemes. For example, some institutions or companies need executives to manage or inspect their corresponding departments while the inspected department should not know who the executives are but only can verify their legitimacy. This paper designs a non-repudiation and anonymity-ensured user authentication system to meet the mentioned special requirements. We also propose a user authentication scheme to ensure that the designed system can work as claimed. In the system, a department is equipped with an authentication device, namely the department authentication device, to authenticate an executive while the executive’s identity is not revealed to the department and only the department’s authentication device can identify the executive for non-repudiation. An executive is equipped with an authentication device to have himself/herself authenticated by the department’s authentication device. Moreover, authentication data stored in an executive’s authentication device does not need to be updated even when management personnel changes are made.
first_indexed 2024-03-09T15:52:31Z
format Article
id doaj.art-5a8eeccc81b144e5b09e8f7b7c2f37c3
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-09T15:52:31Z
publishDate 2022-12-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-5a8eeccc81b144e5b09e8f7b7c2f37c32023-11-24T17:53:26ZengMDPI AGSensors1424-82202022-12-012224967310.3390/s22249673Offline User Authentication Ensuring Non-Repudiation and AnonymityYa-Fen Chang0Wei-Liang Tai1Ka-Ho Fung2Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung 404, TaiwanBachelor Degree Program of Artificial Intelligence, National Taichung University of Science and Technology, Taichung 404, TaiwanDepartment of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung 404, TaiwanUser authentication is the key to ensuring that only authorized users can deal with specific affairs and access services. Applications or systems possessing different properties or requirements need different authentication schemes. For example, some institutions or companies need executives to manage or inspect their corresponding departments while the inspected department should not know who the executives are but only can verify their legitimacy. This paper designs a non-repudiation and anonymity-ensured user authentication system to meet the mentioned special requirements. We also propose a user authentication scheme to ensure that the designed system can work as claimed. In the system, a department is equipped with an authentication device, namely the department authentication device, to authenticate an executive while the executive’s identity is not revealed to the department and only the department’s authentication device can identify the executive for non-repudiation. An executive is equipped with an authentication device to have himself/herself authenticated by the department’s authentication device. Moreover, authentication data stored in an executive’s authentication device does not need to be updated even when management personnel changes are made.https://www.mdpi.com/1424-8220/22/24/9673offlinenon-repudiationanonymityauthenticationsecurity
spellingShingle Ya-Fen Chang
Wei-Liang Tai
Ka-Ho Fung
Offline User Authentication Ensuring Non-Repudiation and Anonymity
Sensors
offline
non-repudiation
anonymity
authentication
security
title Offline User Authentication Ensuring Non-Repudiation and Anonymity
title_full Offline User Authentication Ensuring Non-Repudiation and Anonymity
title_fullStr Offline User Authentication Ensuring Non-Repudiation and Anonymity
title_full_unstemmed Offline User Authentication Ensuring Non-Repudiation and Anonymity
title_short Offline User Authentication Ensuring Non-Repudiation and Anonymity
title_sort offline user authentication ensuring non repudiation and anonymity
topic offline
non-repudiation
anonymity
authentication
security
url https://www.mdpi.com/1424-8220/22/24/9673
work_keys_str_mv AT yafenchang offlineuserauthenticationensuringnonrepudiationandanonymity
AT weiliangtai offlineuserauthenticationensuringnonrepudiationandanonymity
AT kahofung offlineuserauthenticationensuringnonrepudiationandanonymity