An Adaptive Two-Factor Authentication Scheme Based on the Usage of Schnorr Signcryption Algorithm
DOI:
https://doi.org/10.31449/inf.v47i5.4627Abstract
With the current continuous increase in the usage of communication technologies and data transmission amount, the available web services and mobile applications are used to access and complete several online activities such as online education, e-commerce, and online financial transactions. The needs for a strong and secure access control authentication solution of users’ data and the available online resources are crucial. Authentication can play a major rule in protection by implementing a solution, which allows users to prove their identities and provide access permission to all legitimate users only. This paper proposes two-factor authentication scheme based on the usage of a modified copy of the Schnorr Signcryption algorithm. The proposed scheme achieves the target goal of this paper, which provides the users with an efficient solution that can be implemented in any authentication solution as the second factor, with no special requirement and can be used to authenticate the users and control recourses access permission. Moreover, Java-based application is developed in order to examine the proposed scheme in a client/server architecture where it is found that the solution can successfully authenticate authorised users and reject any unauthorised access request with an adequate security protection level and acceptable performance.Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika