Advertisement

An Improved Server Validation Scheme for Multi-server Infrastructure

  • Himanshu MongaEmail author
  • Nancy Girdhar
Short Communication
  • 20 Downloads

Abstract

An improved server validation scheme for a multi-server infrastructure has been introduced. In this scheme, each member involved in communication has to prove its validation before any exchange of information bits. This introduced scheme also secures the server against phishing and other similar attacks. Dynamic properties of the group are handled with ease, making the scheme suitable for real-life applications. Major achieved highlights of the method are that user privacy is respected without requiring any serious time synchronization.

Keywords

Elliptic curve cryptography Visual cryptography Multi-server system Group communicating server 

Notes

References

  1. 1.
    Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Hegde C, Manu S, Shenoy PD, Venugopal KR, Patnaik LM (2008) Secure authentication using image processing and visual cryptography for banking applications. In: Advanced computing and communications, 2008. ADCOM 2008. 16th international conference on 14–17 Dec. 2008, Chennai, IndiaGoogle Scholar
  3. 3.
    Amin R, Islam S, Khan MK, Karati A, Giri D, Kumari S (2017) A two-factor RSA-based robust authentication system for multiserver environments. Secur Commun Netw 13:1–15CrossRefGoogle Scholar
  4. 4.
    Eason G, Noble B, Sneddon IN (1955) On certain integrals of Lipschitz–Hankel type involving products of Bessel functions. Philos Trans R S Lond A247:529–551ADSMathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Naor M, Shamir A (1995) Visual cryptography advances in cryptography-EUROCRYPT’94. Lect Notes Comput Sci 950:1–12CrossRefzbMATHGoogle Scholar
  6. 6.
    Li X, Niu J, Kumari S, Islam SH, Wu F, Khan MK, Das AK (2016) A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wirel Pers Commun 89(2):569–597CrossRefGoogle Scholar
  7. 7.
    Kumar P, Sabitha S (2015) User authentication using visual cryptography. In: 2015 international conference on control, communication and computing india (ICCC), 19–21 November 2015, Trivandrum, IndiaGoogle Scholar
  8. 8.
    Miller V (1986) Use of elliptic curves in cryptography. Adv Cryptol 218:417–426MathSciNetGoogle Scholar

Copyright information

© The National Academy of Sciences, India 2019

Authors and Affiliations

  1. 1.Jawaharlal Nehru Government Engineering CollegeSundernagarIndia

Personalised recommendations