Synchronize Confidential Authentication (SCA)
Document Type
Conference Proceeding
Publication Date
2014
Publication Title
Proceedings of the 2014 ASEE North Central Section Conference
Abstract
Digital identity management is one that is becoming an integral part of our lives, as consumers and businesses rely more and more on online transactions for daily tasks, such as banking, shopping, and bill payment. These transactions crucially depend on networked computer systems to communicate sensitive identity data across personal, company, and enterprise boundaries. Like regular offline transactions, identity theft is always a threat. And it is known that in the digital world, there is nothing that is 100% secure. In this paper, we propose Synchronize Confidential Authentication model that resembles the real world notary service only to become a part of online transactions authentication through a trusted third party referred to as Certificate Authority whose responsibilities are clearly defined. Our proposed model binds confidential pair of keys to remote user/server, no key exchange algorithm needed and presents a new protocol for mutual identity authentication using client authentication flow with variations in its implementation from existing models in the literature that can be summarized in two points: using generation of related pair of confidential keys for user and server instead of using the public key in the client authentication flow and re-generation of new confidential keys based on a time interval as requested by the requestor from Certificate Authority.
Repository Citation
AlObaidi, Mazen; Fu, Huirong; and Zhu, Ye, "Synchronize Confidential Authentication (SCA)" (2014). Electrical and Computer Engineering Faculty Publications. 307.
https://engagedscholarship.csuohio.edu/enece_facpub/307