Authenticator - Explore the Science & Experts | ideXlab



Scan Science and Technology

Contact Leading Edge Experts & Companies

Authenticator

The Experts below are selected from a list of 305781 Experts worldwide ranked by ideXlab platform

Authenticator – Free Register to Access Experts & Abstracts

Rong Hao – One of the best experts on this subject based on the ideXlab platform.

  • enabling public auditing for shared data in cloud storage supporting identity privacy and traceability
    Journal of Systems and Software, 2016
    Co-Authors: Guangyang Yang, Wenting Shen, Rong Hao

    Abstract:

    Identity privacy and traceability are very important for shared cloud data auditing.Design the framework for this problem.Construct the first scheme satisfying the designed framework.Prove the proposed scheme to be secure and justify its performance. Nowadays, cloud storage service has been widely adopted by diverse organizations, through which users can conveniently share data with others. For security consideration, previous public auditing schemes for shared cloud data concealed the identities of group members. However, the unconstrained identity anonymity will lead to a new problem, that is, a group member can maliciously modify shared data without being identified. Since uncontrolled malicious modifications may wreck the usability of the shared data, the identity traceability should also be retained in data sharing. In this paper, we propose an efficient public auditing solution that can preserve the identity privacy and the identity traceability for group members simultaneously. Specifically, we first design a new framework for data sharing in cloud, and formalize the definition of the public auditing scheme for shared cloud data supporting identity privacy and traceability. And then we construct such a scheme, in which a group manager is introduced to help members generate Authenticators to protect the identity privacy and two lists are employed to record the members who perform the latest modification on each block to achieve the identity traceability. Besides, the scheme also achieves data privacy during Authenticator generation by utilizing blind signature technique. Based on the proposed scheme, we further design an auditing system for practical scenarios. Finally, we prove the proposed scheme is secure based on several security requirements, and justify its performance by concrete implementations.

    Free Register to Access Article

  • a public cloud storage auditing scheme with lightweight Authenticator generation
    2015 10th International Conference on P2P Parallel Grid Cloud and Internet Computing (3PGCIC), 2015
    Co-Authors: Wenting Shen, Rong Hao, Xu An Wang

    Abstract:

    Cloud storage is becoming more and more popular with the development of cloud computing technique. Cloud storage auditing, as one important security service, is used to check the integrity of the cloud data stored in cloud for users. However, the burden for users to generate Authenticators is very huge before cloud data are outsourced to cloud in public cloud storage auditing. In order to deal with this problem, we propose a public cloud storage auditing scheme with lightweight Authenticator generation. We design a new framework of public cloud storage auditing, in which an Authenticators Generation Center (AGC) is in charge of generating Authenticators for users. In our proposed scheme, the AGC does not know the real cloud data of users because it only generates the Authenticators for blinded cloud data. To reduce the computation burden at user side, the cloud can verify whether the Authenticators generated by the AGC are correct or not. As a result, the users only consume very little computation for public Authenticator generation and verification. The security analysis and the performance analysis show the proposed scheme is secure and efficient.

    Free Register to Access Article

Norazak Senu – One of the best experts on this subject based on the ideXlab platform.

  • reversible palm vein Authenticator design with quantum dot cellular automata for information security in nanocommunication network
    IEEE Access, 2020
    Co-Authors: Bikash Debnath, Jadav Chandra Das, Ferial Ghaemi, Ali Ahmadian, Norazak Senu

    Abstract:

    Palm vein pattern recognition is one of the most promising and rapidly developing fields of study in biometrics, which makes it an important solution for identity security in biometrics-based user identification systems. Quantum-dot Cellular Automata (QCA) is a developing field of nanotechnology which facilitates the creation of nano-scale logical circuits. Irreversible technology has faced some difficulties, such as higher heat energy dissipation. Reversible logic is therefore essential where heat dissipation is almost insignificant. This article proposes QCA design of a reversible circuit for palm vein authentication utilizing the Feynman gate. Fully reversible Feynman gate is designed. Using this newly designed Feynman gate the palm vein Authenticator circuit is designed. The theoretical values and the results of the simulation correspond to the reliability of the planned circuit. Circuit complexity and circuit cost are explored. Validation of authenticated users by the proposed Authenticator explores its design accuracy as per theoretical values. Energy dissipation of the proposed designs shows that it remains within Lauderer’s limit (0.06meV). This proves that the circuits designed are fully reversible in nature and dissipates very less amount of energy. Comparison with recent QCA state of the art architectures explores its characteristics.

    Free Register to Access Article

Jadav Chandra Das – One of the best experts on this subject based on the ideXlab platform.

  • reversible palm vein Authenticator design with quantum dot cellular automata for information security in nanocommunication network
    IEEE Access, 2020
    Co-Authors: Bikash Debnath, Jadav Chandra Das, Ferial Ghaemi, Ali Ahmadian, Norazak Senu

    Abstract:

    Palm vein pattern recognition is one of the most promising and rapidly developing fields of study in biometrics, which makes it an important solution for identity security in biometrics-based user identification systems. Quantum-dot Cellular Automata (QCA) is a developing field of nanotechnology which facilitates the creation of nano-scale logical circuits. Irreversible technology has faced some difficulties, such as higher heat energy dissipation. Reversible logic is therefore essential where heat dissipation is almost insignificant. This article proposes QCA design of a reversible circuit for palm vein authentication utilizing the Feynman gate. Fully reversible Feynman gate is designed. Using this newly designed Feynman gate the palm vein Authenticator circuit is designed. The theoretical values and the results of the simulation correspond to the reliability of the planned circuit. Circuit complexity and circuit cost are explored. Validation of authenticated users by the proposed Authenticator explores its design accuracy as per theoretical values. Energy dissipation of the proposed designs shows that it remains within Lauderer’s limit (0.06meV). This proves that the circuits designed are fully reversible in nature and dissipates very less amount of energy. Comparison with recent QCA state of the art architectures explores its characteristics.

    Free Register to Access Article

  • User Authentication Based on Quantum-Dot Cellular Automata Using Reversible Logic for Secure Nanocommunication
    Arabian Journal for Science and Engineering, 2016
    Co-Authors: Jadav Chandra Das

    Abstract:

    QCA is a new nanodevice to achieve logic circuit at nanoscale level. User authentication is a key issue in nanocommunication, to allow only authorized user to access data. Excessive heat dissipation of irreversible process caused the circuitry bound of CMOS-based circuit. Reversible logic is an alternative to these problems. Reversible circuits have very low heat energy dissipation which is ideally zero. This paper illustrates an optimized design of Fredkin gate using QCA. The proposed Fredkin gate has outshined the existing circuits in terms of area, cell count, and latency. The design of reversible user password Authenticator circuit has been explored based on Fredkin gate. The quantum cost of this Authenticator circuit is five. For the first time, QCA layout of proposed user Authenticator is also achieved in this paper. The quantum cost of QCA-based Authenticator circuit is 0.041. All the QCA circuits are precise in terms of QCA cell, device density, and clocking zones, i.e., latency. Theoretical values are compared with simulation results that justify the design accuracy of the proposed circuits. The computational functionality of the circuit under thermal randomness is estimated which establishes the stability of the proposed circuit. The estimation of energy dissipation proves that the proposed circuit dissipates very low energy. To achieve low-power nanoscale Authenticator circuit, QCA is used to implement the reversible logic.

    Free Register to Access Article