Offline User Authentication Ensuring Non-Repudiation and Anonymity
User authentication is the key to ensuring that only authorized users can deal with specific affairs and access services. Applications or systems possessing different properties or requirements need different authentication schemes. For example, some institutions or companies need executives to mana...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-12-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/22/24/9673 |
_version_ | 1797455373915914240 |
---|---|
author | Ya-Fen Chang Wei-Liang Tai Ka-Ho Fung |
author_facet | Ya-Fen Chang Wei-Liang Tai Ka-Ho Fung |
author_sort | Ya-Fen Chang |
collection | DOAJ |
description | User authentication is the key to ensuring that only authorized users can deal with specific affairs and access services. Applications or systems possessing different properties or requirements need different authentication schemes. For example, some institutions or companies need executives to manage or inspect their corresponding departments while the inspected department should not know who the executives are but only can verify their legitimacy. This paper designs a non-repudiation and anonymity-ensured user authentication system to meet the mentioned special requirements. We also propose a user authentication scheme to ensure that the designed system can work as claimed. In the system, a department is equipped with an authentication device, namely the department authentication device, to authenticate an executive while the executive’s identity is not revealed to the department and only the department’s authentication device can identify the executive for non-repudiation. An executive is equipped with an authentication device to have himself/herself authenticated by the department’s authentication device. Moreover, authentication data stored in an executive’s authentication device does not need to be updated even when management personnel changes are made. |
first_indexed | 2024-03-09T15:52:31Z |
format | Article |
id | doaj.art-5a8eeccc81b144e5b09e8f7b7c2f37c3 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-09T15:52:31Z |
publishDate | 2022-12-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-5a8eeccc81b144e5b09e8f7b7c2f37c32023-11-24T17:53:26ZengMDPI AGSensors1424-82202022-12-012224967310.3390/s22249673Offline User Authentication Ensuring Non-Repudiation and AnonymityYa-Fen Chang0Wei-Liang Tai1Ka-Ho Fung2Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung 404, TaiwanBachelor Degree Program of Artificial Intelligence, National Taichung University of Science and Technology, Taichung 404, TaiwanDepartment of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung 404, TaiwanUser authentication is the key to ensuring that only authorized users can deal with specific affairs and access services. Applications or systems possessing different properties or requirements need different authentication schemes. For example, some institutions or companies need executives to manage or inspect their corresponding departments while the inspected department should not know who the executives are but only can verify their legitimacy. This paper designs a non-repudiation and anonymity-ensured user authentication system to meet the mentioned special requirements. We also propose a user authentication scheme to ensure that the designed system can work as claimed. In the system, a department is equipped with an authentication device, namely the department authentication device, to authenticate an executive while the executive’s identity is not revealed to the department and only the department’s authentication device can identify the executive for non-repudiation. An executive is equipped with an authentication device to have himself/herself authenticated by the department’s authentication device. Moreover, authentication data stored in an executive’s authentication device does not need to be updated even when management personnel changes are made.https://www.mdpi.com/1424-8220/22/24/9673offlinenon-repudiationanonymityauthenticationsecurity |
spellingShingle | Ya-Fen Chang Wei-Liang Tai Ka-Ho Fung Offline User Authentication Ensuring Non-Repudiation and Anonymity Sensors offline non-repudiation anonymity authentication security |
title | Offline User Authentication Ensuring Non-Repudiation and Anonymity |
title_full | Offline User Authentication Ensuring Non-Repudiation and Anonymity |
title_fullStr | Offline User Authentication Ensuring Non-Repudiation and Anonymity |
title_full_unstemmed | Offline User Authentication Ensuring Non-Repudiation and Anonymity |
title_short | Offline User Authentication Ensuring Non-Repudiation and Anonymity |
title_sort | offline user authentication ensuring non repudiation and anonymity |
topic | offline non-repudiation anonymity authentication security |
url | https://www.mdpi.com/1424-8220/22/24/9673 |
work_keys_str_mv | AT yafenchang offlineuserauthenticationensuringnonrepudiationandanonymity AT weiliangtai offlineuserauthenticationensuringnonrepudiationandanonymity AT kahofung offlineuserauthenticationensuringnonrepudiationandanonymity |