ID-based authentication scheme combined with identity-based encryption with fingerprint hashing

被引:0
作者
Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China [1 ]
不详 [2 ]
机构
[1] Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing
[2] Key Laboratory of Complex Systems and Intelligence Science, Institute of Automation, Chinese Academy of Sciences, Beijing
来源
J. China Univ. Post Telecom. | 2008年 / 4卷 / 75-80,120期
基金
中国国家自然科学基金;
关键词
bilinear pairing; fingerprint authentication; fingerprint hashing; ID authentication; ID-based encryption;
D O I
10.1016/S1005-8885(08)60407-0
中图分类号
学科分类号
摘要
Current identity-based (ID) cryptosystem lacks the mechanisms of two-party authentication and user's private key distribution. Some ID-based signcryption schemes and ID-based authenticated key agreement protocols have been presented, but they cannot solve the problem completely. A novel ID-based authentication scheme based on ID-based encryption (IBE) and fingerprint hashing method is proposed to solve the difficulties in the IBE scheme, which includes message receiver authenticating the sender, the trusted authority (TA) authenticating the users and transmitting the private key to them. Furthermore, the scheme extends the application of fingerprint authentication from terminal to network and protects against fingerprint data fabrication. The fingerprint authentication method consists of two factors. This method combines a token key, for example, the USB key, with the user's fingerprint hash by mixing a pseudo-random number with the fingerprint feature. The security and experimental efficiency meet the requirements of practical applications. © 2008 The Journal of China Universities of Posts and Telecommunications.
引用
收藏
页码:75 / 80,120
相关论文
共 50 条
  • [41] Efficient Group ID-Based Encryption With Equality Test Against Insider Attack
    Ling, Yunhao
    Ma, Sha
    Huang, Qiong
    Li, Ximing
    Zhong, Yijian
    Ling, Yunzhi
    [J]. COMPUTER JOURNAL, 2021, 64 (04) : 661 - 674
  • [42] ID-Based Aggregate Proxy Signature Scheme Realizing Warrant-Based Delegation
    Lin, Yen-Ching
    Wu, Tzong-Chen
    Tsai, Jia-Lun
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (03) : 441 - 457
  • [43] Strong Designated Verifier ID-based Threshold Ring Signature Scheme
    Wu, Lei
    Hu, Defa
    [J]. INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS & STATISTICS, 2013, 41 (11): : 222 - 229
  • [44] An Improved ID-Based Key Management Scheme in Wireless Sensor Network
    Chatterjee, Kakali
    De, Asok
    Gupta, Daya
    [J]. ADVANCES IN SWARM INTELLIGENCE, ICSI 2012, PT II, 2012, 7332 : 351 - 359
  • [45] LIGHTWEIGHT TRUSTED ID-BASED SIGNCRYPTION SCHEME FOR WIRELESS SENSOR NETWORKS
    Li, Zhimin
    Xu, Xin
    Fan, Zexiang
    [J]. INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2012, 5 (04) : 799 - 810
  • [46] An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    He, Debiao
    Zeadally, Sherali
    Xu, Baowen
    Huang, Xinyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2681 - 2691
  • [47] Identity authentication system based on fingerprint identification and pulse certification
    Xu, Qian
    Deng, Jie
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 280 - 284
  • [48] An Efficient Identity-based Multi-signcryption Scheme
    Qi, Z. H.
    Yang, H. C.
    Huang, H.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 308 - 310
  • [49] Efficient Identity-Based Generalized Ring Signcryption Scheme
    Zhou, Caixue
    Cui, Zongmin
    Gao, Guangyong
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (12): : 5553 - 5571
  • [50] Identity-Based Sanitizable Signature Scheme in the Standard Model
    Ming, Yang
    Shen, Xiaoqin
    Peng, Yamian
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT 1, 2010, 105 : 9 - +