A Kind of Identity Authentication under Cloud Computing Environment
Title | A Kind of Identity Authentication under Cloud Computing Environment |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Miao Yingkai, Chen Jia |
Conference Name | Intelligent Computation Technology and Automation (ICICTA), 2014 7th International Conference on |
Date Published | Oct |
Keywords | audit stage, authentication, authorisation, authorization stage, biometric encryption, cloud computing, cloud computing environment, Encryption, encryption technology, homomorphism, homomorphism technology, identity authentication, identity authentication scheme, public key cryptography, register and training template stage, Servers, Spectrogram, Training, voice login and authentication stage, voice technology |
Abstract | An identity authentication scheme is proposed combining with biometric encryption, public key cryptography of homomorphism and predicate encryption technology under the cloud computing environment. Identity authentication scheme is proposed based on the voice and homomorphism technology. The scheme is divided into four stages, register and training template stage, voice login and authentication stage, authorization stage, and audit stage. The results prove the scheme has certain advantages in four aspects. |
URL | https://ieeexplore.ieee.org/document/7003473 |
DOI | 10.1109/ICICTA.2014.10 |
Citation Key | 7003473 |
- homomorphism technology
- voice technology
- voice login and authentication stage
- Training
- Spectrogram
- Servers
- register and training template stage
- public key cryptography
- identity authentication scheme
- identity authentication
- audit stage
- homomorphism
- encryption technology
- encryption
- cloud computing environment
- Cloud Computing
- biometric encryption
- authorization stage
- authorisation
- authentication