ID-based authentication scheme combined with identity-based encryption with fingerprint hashing

被引:0
作者
Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China [1 ]
不详 [2 ]
机构
[1] Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing
[2] Key Laboratory of Complex Systems and Intelligence Science, Institute of Automation, Chinese Academy of Sciences, Beijing
来源
J. China Univ. Post Telecom. | 2008年 / 4卷 / 75-80,120期
基金
中国国家自然科学基金;
关键词
bilinear pairing; fingerprint authentication; fingerprint hashing; ID authentication; ID-based encryption;
D O I
10.1016/S1005-8885(08)60407-0
中图分类号
学科分类号
摘要
Current identity-based (ID) cryptosystem lacks the mechanisms of two-party authentication and user's private key distribution. Some ID-based signcryption schemes and ID-based authenticated key agreement protocols have been presented, but they cannot solve the problem completely. A novel ID-based authentication scheme based on ID-based encryption (IBE) and fingerprint hashing method is proposed to solve the difficulties in the IBE scheme, which includes message receiver authenticating the sender, the trusted authority (TA) authenticating the users and transmitting the private key to them. Furthermore, the scheme extends the application of fingerprint authentication from terminal to network and protects against fingerprint data fabrication. The fingerprint authentication method consists of two factors. This method combines a token key, for example, the USB key, with the user's fingerprint hash by mixing a pseudo-random number with the fingerprint feature. The security and experimental efficiency meet the requirements of practical applications. © 2008 The Journal of China Universities of Posts and Telecommunications.
引用
收藏
页码:75 / 80,120
相关论文
共 50 条
  • [31] An ID-based signcryption scheme for multiple receivers in standard model
    Qi Z.
    Yang G.
    Ren X.
    Wang H.
    Jiangsu Daxue Xuebao (Ziran Kexue Ban)/Journal of Jiangsu University (Natural Science Edition), 2011, 32 (05): : 573 - 577
  • [32] A Secure Identity-based Deniable Authentication Protocol for MANETs
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 91 - 95
  • [33] An Improved ID-based Proxy Signature Scheme with Message Recovery
    Zhou, Caixue
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 151 - 163
  • [34] A SECURE ID-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME
    Yang, Bo
    Xiao, Zibi
    Hu, Zhengming
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 543 - +
  • [35] Strong designated Verifier ID-based Ring Signature Scheme
    Wu Lei
    Li Daxing
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 294 - +
  • [36] An ID-based aggregate signature scheme with constant pairing computations
    Shim, Kyung-Ah
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (10) : 1873 - 1880
  • [37] New identity-based key-insulated convertible multi-authenticated encryption scheme
    Hsu, Chien-Lung
    Lin, Han-Yu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (05) : 1724 - 1731
  • [38] A new identity-based group signature scheme
    Cheng, Xiangguo
    Guo, Lifeng
    Yu, Jia
    Ma, Huiran
    Wu, Yuexiu
    International Journal of Computers and Applications, 2013, 35 (01) : 1 - 5
  • [39] An Improved Identity-Based Ring Signcryption Scheme
    Deng, Lunzhi
    Liu, Chenglian
    Wang, Xiangbin
    INFORMATION SECURITY JOURNAL, 2013, 22 (01): : 46 - 54