An Adaptive Two-Factor Authentication Scheme Based on the Usage of Schnorr Signcryption Algorithm
Abstract
With the current continuous increase in the usage of communication technologies and data transmission amount, the available web services and mobile applications are used to access and complete several online activities such as online education, e-commerce, and online financial transactions. The needs for a strong and secure access control authentication solution of users’ data and the available online resources are crucial. Authentication can play a major rule in protection by implementing a solution, which allows users to prove their identities and provide access permission to all legitimate users only. This paper proposes two-factor authentication scheme based on the usage of a modified copy of the Schnorr Signcryption algorithm. The proposed scheme achieves the target goal of this paper, which provides the users with an efficient solution that can be implemented in any authentication solution as the second factor, with no special requirement and can be used to authenticate the users and control recourses access permission. Moreover, Java-based application is developed in order to examine the proposed scheme in a client/server architecture where it is found that the solution can successfully authenticate authorised users and reject any unauthorised access request with an adequate security protection level and acceptable performance.DOI:
https://doi.org/10.31449/inf.v47i5.4627Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright in their work. By submitting to and publishing with Informatica, authors grant the publisher (Slovene Society Informatika) the non-exclusive right to publish, reproduce, and distribute the article and to identify itself as the original publisher.
All articles are published under the Creative Commons Attribution license CC BY 3.0. Under this license, others may share and adapt the work for any purpose, provided appropriate credit is given and changes (if any) are indicated.
Authors may deposit and share the submitted version, accepted manuscript, and published version, provided the original publication in Informatica is properly cited.







