Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Dec 10;22(24):9673.
doi: 10.3390/s22249673.

Offline User Authentication Ensuring Non-Repudiation and Anonymity

Affiliations

Offline User Authentication Ensuring Non-Repudiation and Anonymity

Ya-Fen Chang et al. Sensors (Basel). .

Abstract

User authentication is the key to ensuring that only authorized users can deal with specific affairs and access services. Applications or systems possessing different properties or requirements need different authentication schemes. For example, some institutions or companies need executives to manage or inspect their corresponding departments while the inspected department should not know who the executives are but only can verify their legitimacy. This paper designs a non-repudiation and anonymity-ensured user authentication system to meet the mentioned special requirements. We also propose a user authentication scheme to ensure that the designed system can work as claimed. In the system, a department is equipped with an authentication device, namely the department authentication device, to authenticate an executive while the executive's identity is not revealed to the department and only the department's authentication device can identify the executive for non-repudiation. An executive is equipped with an authentication device to have himself/herself authenticated by the department's authentication device. Moreover, authentication data stored in an executive's authentication device does not need to be updated even when management personnel changes are made.

Keywords: anonymity; authentication; non-repudiation; offline; security.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
The architecture of the designed offline non-repudiation and anonymity-ensured user authentication system.
Figure 2
Figure 2
The process of the management server to initialize the executive’s authentication device in the initialization phase of the proposed user authentication scheme.
Figure 3
Figure 3
The process of the management server to initialize the system administrator’s authentication device in the initialization phase of the proposed user authentication scheme.
Figure 4
Figure 4
Department authentication device setup phase of the proposed user authentication scheme.
Figure 5
Figure 5
Authentication phase of the proposed user authentication scheme.
Figure 6
Figure 6
The computational costs for the initialization phase.
Figure 7
Figure 7
The computational costs for the department authentication device setup phase.
Figure 8
Figure 8
The computational costs for the authentication phase.

References

    1. Mujahid U., Najam-ul-Islam M., Sarwar S. A new ultralightweight RFID authentication protocol for passive low cost tags: KMAP. Wirel. Pers. Commun. 2017;94:725–744. doi: 10.1007/s11277-016-3647-4. - DOI
    1. Teh P.S., Zhang N., Tan S.Y., Shi Q., Khoh W.H., Nawaz R. Strengthen user authentication on mobile devices by using user’s touch dynamics pattern. J. Ambient Intell. Humaniz. Comput. 2020;11:4019–4039. doi: 10.1007/s12652-019-01654-y. - DOI
    1. Guo Y., Guo Y. FogHA: An efficient handover authentication for mobile devices in fog computing. Comput. Secur. 2021;108:102358. doi: 10.1016/j.cose.2021.102358. - DOI
    1. Chakraborty D., Bugiel S. SimFIDO: FIDO2 user authentication with simtpm; Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security; London, UK. 11–15 November 2019; pp. 2569–2571.
    1. Liu X., Ma W., Cao H. MBPA: A medibchain-based privacy-preserving mutual authentication in TMIS for mobile medical cloud architecture. IEEE Access. 2019;7:149282–149298. doi: 10.1109/ACCESS.2019.2947313. - DOI - PubMed