ID-based key exchange protocol using smart cards with fingerprint

被引:0
作者
Bae, HJ [1 ]
Kim, HS [1 ]
Yoo, KY [1 ]
机构
[1] Kyungpook Natl Univ, Taegu 702701, South Korea
来源
PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS | 2003年
关键词
smart card; authentication; fingerprint; session key; random number;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an ID-based key exchange protocol using smart cards, which performs authentication and key exchange by using user's identification information. The proposed protocol exchanges a session key only after the verification of the smart card ownership using users fingerprint is succeeded. The minutia information of fingerprint is also used to generate a random number in the protocol. The proposed protocol offers the perfect forward secrecy and can withstand impersonation attack and potential replay attack.
引用
收藏
页码:448 / 452
页数:5
相关论文
共 50 条
  • [11] Authentication and ID-Based Key Management Protocol in Pervasive Environment
    Moon, Jong Sik
    Park, Jong Hyuk
    Lee, Deok Gyu
    Lee, Im-Yeong
    WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 91 - 103
  • [12] Efficient three-party key exchange using smart cards
    Jaung, WS
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 619 - 624
  • [13] Cryptanalysis of a fingerprint-based remote user authentication scheme using smart cards
    Hsieh, BT
    Yeh, HT
    Sun, HM
    Lin, CT
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 349 - 350
  • [14] An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem
    Han, Weiwei
    Zhu, Zhian
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (08) : 1173 - 1185
  • [15] A Dynamic ID-based authentication scheme with smart token
    Hamza, Nermin
    Hassan, Bahaa El-Din M.
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES 2009), 2009, : 294 - +
  • [16] Efficient ID-based authentication and key agreement protocols for the session initiation protocol
    Kilinc, Haci Hakan
    Allaberdiyev, Yolguly
    Yanik, Tugrul
    Erdem, Serdar Suer
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2015, 23 (02) : 560 - 579
  • [17] A secret key based authentication scheme using smart cards
    Yoon, EJ
    Jung, JH
    Yoo, KY
    Kim, WH
    SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 65 - 71
  • [18] Efficient ID-based authenticated key agreement
    Jin Lijie
    Xu Chunxiang
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 681 - 684
  • [19] An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET
    Kumar, Vimal
    Kumar, Rakesh
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 110 - 121
  • [20] Efficient password authenticated key agreement using smart cards
    Juang, WS
    COMPUTERS & SECURITY, 2004, 23 (02) : 167 - 173