AAVSS: Auxiliary Authorization Mechanism Based on Arbitrary-Angle VSS

To provide seamless Internet services, most public buildings, including coffee shops, airports, and libraries, temporary personal computers are offered to users for network access. This has led to a potential risk that the secret information of the user may be leaked out once these temporary computers have been affected by Trojans. Generally, the service provider checks the authority of a user according to a series of authentication procedure. While a user enters the verification token into the public computers, an attacker may apply a key-logger to steal the password or personal information. In this article, we have first introduced the visual secret sharing technique with arbitrary-angle stacking to design an auxiliary authorization protocol. According to the stacked one-time password, users can have the access to network services without keying any secret information into the public computers. Moreover, the efficiency of AAVSS is favorable to resource-constrained mobile device.

[1]  Ning Zhang,et al.  S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol , 2017, IEEE Internet of Things Journal.

[2]  Eduardo Feitosa,et al.  A cyber-resilient architecture for critical security services , 2016, J. Netw. Comput. Appl..

[3]  Sugata Sanyal,et al.  A Survey on Security Issues in Cloud Computing , 2011, 1109.5388.

[4]  Franci Pivec,et al.  Measuring the information society , 2003 .

[5]  Chin-Chen Chang,et al.  An Efficient and Secure Smart Card Based Password Authentication Scheme , 2017, Int. J. Netw. Secur..

[6]  Edwin Weiss,et al.  A user authentication scheme not requiring secrecy in the computer , 1974, Commun. ACM.

[7]  Hung-Min Sun,et al.  oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks , 2012, IEEE Transactions on Information Forensics and Security.

[8]  Ronggong Song Advanced smart card based password authentication protocol , 2010, Comput. Stand. Interfaces.

[9]  Her-Chang Chao,et al.  Random-grid based progressive visual secret sharing scheme with adaptive priority , 2017, Digit. Signal Process..

[10]  Chih-Hung Lin,et al.  Distortionless visual multi-secret sharing based on random grid , 2014, Inf. Sci..

[11]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[12]  Neil Haller,et al.  The S/KEY One-Time Password System , 1995, RFC.

[13]  Mukesh Soni,et al.  Advanced formal authentication protocol using smart cards for network applicants , 2018, Comput. Electr. Eng..