Protecting secret keys with personal entropy
Future Generation Computer Systems - Special issue on security on the Web
Enhanced Password Authentication through Fuzzy Logic
IEEE Expert: Intelligent Systems and Their Applications
Spatiotemporal Connectionist Networks: A Taxonomy and Review
Neural Computation
A Convertible Multi-Authenticated Encryption scheme for group communications
Information Sciences: an International Journal
Simple password-based three-party authenticated key exchange without server public keys
Information Sciences: an International Journal
Keystroke pressure-based typing biometrics authentication system using support vector machines
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
A communication-efficient three-party password authenticated key exchange protocol
Information Sciences: an International Journal
Self-generated-certificate public key encryption without pairing and its application
Information Sciences: an International Journal
Provably secure three-party password-based authenticated key exchange protocol
Information Sciences: an International Journal
Efficient certificateless proxy signature scheme with provable security
Information Sciences: an International Journal
User authentication through typing biometrics features
IEEE Transactions on Signal Processing
Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Verification of computer users using keystroke dynamics
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
A parallel decision tree-based method for user authentication based on keystroke patterns
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Computer user verification using login string keystroke dynamics
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
User classification for keystroke dynamics authentication
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
HOTA: Handover optimized ticket-based authentication in network-based mobility management
Information Sciences: an International Journal
Using the idea of the sparse representation to perform coarse-to-fine face recognition
Information Sciences: an International Journal
Hi-index | 0.07 |
It is well-known that the protection of long-lived private keys in cryptographic schemes is one of the most important issues for information security. Any cryptographic scheme that reveals private keys will soon have its security absolutely disintegrate. For example, in digital signature systems, anyone who obtains the victim's private key, authenticity and non-repudiation can no longer be claimed or proven. Because the private key is a long random bit string and should be stored securely, some special cryptographic hardware such as an IC (Integrated Circuit) card is needed to store and protect the private key. Unfortunately, the security of private keys solely depends on the vulnerable passwords. This study proposes combining a neural network technique and password keystroke features to dynamically generate a long-lived private key rather than statically stored in a storage unit. Compared with other traditional methods, even if the storage unit is lost or the password is revealed, the probability of exposing the private key is reduced.