A Novel Authentication Scheme Based on Torus Automorphism for Smart Card

被引:0
作者
Chang, Chin-Chen [1 ,2 ]
Mao, Qian [2 ,3 ]
Wu, Hsiao-Ling [1 ]
机构
[1] Department of Information Engineering and Computer Science, Feng Chia University, Taichung, 40724, No. 100, Wenhwa Rd., Seatwen
[2] Department of Computer Science and Information Engineering, Asia University, Taichung, 41354, No. 500, Lioufeng Rd., Wufeng
[3] Department of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, 200093, No. 516, Jungong Rd., Yangpu
来源
Smart Innovation, Systems and Technologies | 2013年 / 21卷
关键词
Authentication; Image Encryption; Secret Sharing; Smart Card; Torus Automorphism;
D O I
10.1007/978-3-642-35473-1_6
中图分类号
学科分类号
摘要
A novel authentication scheme for smart card is proposed in this paper. In this scheme, the cardholder's photograph is printed on the card. Meanwhile, the compressed image of the same photograph is encrypted by the torus automorphism. The encrypted image is stored in the smart card. The secret keys for decryption are shared by a trusted third party and the user. Only when all the secret keys are presented can the original image be recovered. The recovered image should be the same as the photograph printed on the card. The combination of the image encryption using torus automorphism and secret sharing provides high security for the proposed authentication scheme. © 2013 Springer-Verlag Berlin Heidelberg.
引用
收藏
页码:53 / 60
页数:7
相关论文
共 15 条
[1]  
Sonwanshi S.S., Ahirwal R.R., Jain Y.K., An Efficient Smart Card Based Remote User Authentication Scheme Using Hash Function, Proc. 2012 IEEE Students' Conference On Electrical, Electronics and Computer Science, SCEECS, pp. 1-4, (2012)
[2]  
Sood S.K., Sarje A.K., Singh K., Smart Card Based Secure Authentication and Key Agreement Protocol, Proc. 2010 International Conference On Computer and Communication Technology, ICCCT, pp. 7-14, (2010)
[3]  
Matanovic G., Mikuc M., Implementing Certificate-Based Authentication Protocol on Smart Cards, Proc. 2012 Proceedings of the 35th International Convention, MIPRO, pp. 1514-1519, (2012)
[4]  
Zhao Q.F., Hsieh C.H., Card User Authentication Based on Generalized Image Morph-ing, Proc. 2011 3rd International Conference On Awareness Science and Technology, ICAST, pp. 117-122, (2011)
[5]  
Thongkor K., Amornraksa T., Digital Image Watermarking for Photo Authentication in Thai National ID Card, Proc. 2012 9th International Conference On Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, ECTI-CON, pp. 1-4, (2012)
[6]  
Yahaya Y.H., Isa M., Aziz M.I., Fingerprint Biometrics Authentication on Smart Card, Proc. Second International Conference On Computer and Electrical Engineering, ICCEE, pp. 671-673, (2009)
[7]  
Das A.K., Analysis and Improvement on an Efficient Biometric-Based Remote User Authentication Scheme Using Smart Cards, IET Information Security, 5, 3, pp. 145-151, (2011)
[8]  
Luo X.Z., Fan J.H., Wu J.H., Single-Channel Color Image Encryption Based on the Multiple-Order Discrete Fractional Fourier Transform and Chaotic Scrambling, Proc. 2012 International Conference On Information Science and Technology, ICIST, pp. 780-784, (2012)
[9]  
Bhatnagar G., Wu Q.M.J., Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission, IEEE Transactions On Instrumentation and Measurement, 61, 4, pp. 876-887, (2012)
[10]  
Tao R., Meng X.Y., Wang Y., Image Encryption with Multiorders of Fractional Fourier Transforms, IEEE Transactions On Information Forensics and Security, 5, 4, pp. 734-738, (2010)