An efficient and secure biometric remote user authentication scheme using smart cards

被引:0
作者
Wang, Xiaomin [1 ]
Zhang, Wenfang [2 ]
机构
[1] SouthWest Jiaotong Univ, Key Lab Traff Informat Engn & Control, Chengdu 610031, Sichuan, Peoples R China
[2] Southwest Jiaotong Univ, Key Lab Informat Secur & Natl Comp Grid, Chengdu 610031, Sichuan, Peoples R China
来源
PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS | 2008年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Remote user authentication schemes are widely investigated recently. This paper points out some existent problems in smartcard based schemes. As a comprehensive solution, a novel authentication scheme using two-variant hashing technique and fingerprint-biometric is presented. Security analysis shows that the proposed scheme provides secure, robust, and trustworthy remote authentication over insecure network. Moreover, computational costs and efficiency of this scheme are encouraging for practical implementation in the resource-constraint environment.
引用
收藏
页码:1864 / +
页数:3
相关论文
共 15 条
  • [1] [Anonymous], 2004, PATTERN RECOGN, DOI DOI 10.1016/j.patcog.2004.04.011
  • [2] Chan CK, 2002, COMPUT SECUR, V21, P74
  • [3] An efficient and practical solution to remote authentication: Smart card
    Chien, HY
    Jan, JK
    Tseng, YM
    [J]. COMPUTERS & SECURITY, 2002, 21 (04) : 372 - 375
  • [4] Security of two remote user authentication schemes using smart cards
    Hsu, CL
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (04) : 1196 - 1198
  • [5] A simple remote user authentication scheme
    Hwang, MS
    Lee, CC
    Tang, YL
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2002, 36 (1-2) : 103 - 107
  • [6] On-line fingerprint verification
    Jain, A
    Hong, L
    Bolle, R
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1997, 19 (04) : 302 - 314
  • [7] Hiding biometric data
    Jain, AK
    Uludag, U
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2003, 25 (11) : 1494 - 1498
  • [8] Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
    Khan, Muhammad Khurram
    Zhang, Jiashu
    Wang, Xiaomin
    [J]. CHAOS SOLITONS & FRACTALS, 2008, 35 (03) : 519 - 524
  • [9] Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
  • [10] Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    Ku, WC
    Chen, SM
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) : 204 - 207