International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 68 | Issue 1 | Year 2020 | Article Id. IJCTT-V68I1P111 | DOI : https://doi.org/10.14445/22312803/IJCTT-V68I1P111

An Enhanced Mutual Authentication Scheme using One-Time Passwords with Images


Nagashetty B Kolar, Dr. Raju RamDr.P.S.V.Vachaspati, Dr.P.Pardhasaradhi, Dr.SK.Nazeerakrishna Gondkar

Received Revised Accepted
21 Nov 2019 17 Jan 2020 26 Jan 2020

Citation :

Nagashetty B Kolar, Dr. Raju RamDr.P.S.V.Vachaspati, Dr.P.Pardhasaradhi, Dr.SK.Nazeerakrishna Gondkar, "An Enhanced Mutual Authentication Scheme using One-Time Passwords with Images," International Journal of Computer Trends and Technology (IJCTT), vol. 68, no. 1, pp. 45-51, 2020. Crossref, https://doi.org/10.14445/22312803/IJCTT-V68I1P111

Abstract

Is it possible to prove a statement without yielding anything beyond its validity? Zeroknowledge protocols, as their name indicates, are cryptographic protocols which do not reveal any information or secret itself during the protocol, or to any eaves- dropper. These proofs possess some very interesting features, and as the secret itself is not transferred to the verifying principal, they cannot try to masquerade as you to any third party

Keywords

Zero knowledge, Identity authentication, Visual Cryptography, Mutual Authentication.

References

[1] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, ?Visual cryptography for general access structures,? Information and Computation, 129(2), 1996, pp. 86–106.
[2] C. Blundo, A. De Santis, and D. R. Stinson, ?On the contrast in visual cryptography schemes,? Journal of Cryptology, 12(4), 1999, pp.261–289.
[3] M. Naor and A. Shamir, ?Visual cryptography,? in Advances in Cryptology-EUROCRYPT ‘94, LNCS 950, Springer-Verlag, 1995, pp.1–12.
[4] W. G. Tzeng and C. M. Hu, ?A new approach for visual cryptography,? Designs, Codes and Cryptography, 27, 2002, pp. 207–227.
[5] E. R. Verheul and H. C. A. van Tilborg, ?Constructions and Properties of k out of n Visual Secret Sharing Schemes,? Designs, Codes and Cryptography, 11, 1997, pp. 179–196.
[6] Chetanatii Hegde, Manu S, P Deepa Shenoy, Venugopal K R, L M Patnaik ?Secure Authentication using Image Processing and Visual Cryptography for Banking Applications? 978-1-4244-2963-9/13/$26 © 2013 IEEE.
[7] C. M. Hu and W. G. Tzeng, ?Cheating Prevention in Visual Cryptography? IEEE Transaction on Image Processing, vol. 16, no. 1, Jan-2007,pp. 36-45.