Title :
A Kind of Identity Authentication under Cloud Computing Environment
Author :
Miao Yingkai ; Chen Jia
Author_Institution :
Puyang Vocational & Tech. Coll., Puyang, China
Abstract :
An identity authentication scheme is proposed combining with biometric encryption, public key cryptography of homomorphism and predicate encryption technology under the cloud computing environment. Identity authentication scheme is proposed based on the voice and homomorphism technology. The scheme is divided into four stages, register and training template stage, voice login and authentication stage, authorization stage, and audit stage. The results prove the scheme has certain advantages in four aspects.
Keywords :
authorisation; cloud computing; public key cryptography; audit stage; authorization stage; biometric encryption; cloud computing environment; encryption technology; homomorphism technology; identity authentication scheme; public key cryptography; register and training template stage; voice login and authentication stage; voice technology; Authentication; Cloud computing; Encryption; Servers; Spectrogram; Training; cloud computing; homomorphism; identity authentication;
Conference_Titel :
Intelligent Computation Technology and Automation (ICICTA), 2014 7th International Conference on
Conference_Location :
Changsha
Print_ISBN :
978-1-4799-6635-6
DOI :
10.1109/ICICTA.2014.10