ID-based key exchange protocol using smart cards with fingerprint

被引:0
作者
Bae, HJ [1 ]
Kim, HS [1 ]
Yoo, KY [1 ]
机构
[1] Kyungpook Natl Univ, Taegu 702701, South Korea
来源
PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS | 2003年
关键词
smart card; authentication; fingerprint; session key; random number;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an ID-based key exchange protocol using smart cards, which performs authentication and key exchange by using user's identification information. The proposed protocol exchanges a session key only after the verification of the smart card ownership using users fingerprint is succeeded. The minutia information of fingerprint is also used to generate a random number in the protocol. The proposed protocol offers the perfect forward secrecy and can withstand impersonation attack and potential replay attack.
引用
收藏
页码:448 / 452
页数:5
相关论文
共 50 条
  • [1] On the security of ID-based password authentication scheme using smart cards and fingerprints
    Lin, CH
    Lin, TS
    Lin, HH
    Lai, YY
    ITRE 2005: 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, PROCEEDINGS, 2005, : 230 - 232
  • [2] Dynamic ID-based remote user password authentication schemes using smart cards: A review
    Madhusudhan, R.
    Mittal, R. C.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (04) : 1235 - 1248
  • [3] An Improvement of Dynamic ID-Based Remote User Authentication Scheme with Smart Cards
    Gao, Zhengxian
    Tu, Yaqing
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 4562 - 4567
  • [4] DoS-resistant ID-based password authentication scheme using smart cards
    Hwang, Min-Shiang
    Chong, Song-Kong
    Chen, Te-Yu
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (01) : 163 - 172
  • [5] Robust dynamic ID-based remote user authentication scheme using smart cards
    Li, Xiong
    Niu, Jianwei
    Liu, Yazhi
    Liao, Junguo
    Liang, Wei
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2014, 17 (04) : 254 - 264
  • [6] Cryptanalysis of Three Dynamic ID-Based Remote User Authentication Schemes Using Smart Cards
    Gao, Zhengxian
    Huang, Shou Hsuan Stephen
    Ding, Wei
    2016 IEEE INTERNATIONAL CONFERENCE OF ONLINE ANALYSIS AND COMPUTING SCIENCE (ICOACS), 2016, : 44 - 52
  • [7] Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards
    Ku, WC
    Chang, ST
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (05) : 2165 - 2167
  • [8] An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    COMPUTER JOURNAL, 2010, 53 (07) : 1062 - 1070
  • [9] IMPROVED ID-BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
    Toan-Thinh Truong
    Minh-Triet Tran
    Anh-Duc Duong
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 1672 - 1677
  • [10] Authentication and ID-Based Key Management Protocol in Pervasive Environment
    Jong Sik Moon
    Jong Hyuk Park
    Deok Gyu Lee
    Im-Yeong Lee
    Wireless Personal Communications, 2010, 55 : 91 - 103