ID-based key exchange protocol using smart cards with fingerprint

被引:0
作者
Bae, HJ [1 ]
Kim, HS [1 ]
Yoo, KY [1 ]
机构
[1] Kyungpook Natl Univ, Taegu 702701, South Korea
来源
PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS | 2003年
关键词
smart card; authentication; fingerprint; session key; random number;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an ID-based key exchange protocol using smart cards, which performs authentication and key exchange by using user's identification information. The proposed protocol exchanges a session key only after the verification of the smart card ownership using users fingerprint is succeeded. The minutia information of fingerprint is also used to generate a random number in the protocol. The proposed protocol offers the perfect forward secrecy and can withstand impersonation attack and potential replay attack.
引用
收藏
页码:448 / 452
页数:5
相关论文
共 50 条
[11]   Authentication and ID-Based Key Management Protocol in Pervasive Environment [J].
Jong Sik Moon ;
Jong Hyuk Park ;
Deok Gyu Lee ;
Im-Yeong Lee .
Wireless Personal Communications, 2010, 55 :91-103
[12]   Efficient three-party key exchange using smart cards [J].
Jaung, WS .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :619-624
[13]   Cryptanalysis of a fingerprint-based remote user authentication scheme using smart cards [J].
Hsieh, BT ;
Yeh, HT ;
Sun, HM ;
Lin, CT .
37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, :349-350
[14]   A Dynamic ID-based authentication scheme with smart token [J].
Hamza, Nermin ;
Hassan, Bahaa El-Din M. .
2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES 2009), 2009, :294-+
[15]   An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem [J].
Han, Weiwei ;
Zhu, Zhian .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (08) :1173-1185
[16]   Efficient ID-based authentication and key agreement protocols for the session initiation protocol [J].
Kilinc, Haci Hakan ;
Allaberdiyev, Yolguly ;
Yanik, Tugrul ;
Erdem, Serdar Suer .
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2015, 23 (02) :560-579
[17]   A secret key based authentication scheme using smart cards [J].
Yoon, EJ ;
Jung, JH ;
Yoo, KY ;
Kim, WH .
SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, :65-71
[18]   Efficient ID-based authenticated key agreement [J].
Jin Lijie ;
Xu Chunxiang .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, :681-684
[19]   An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET [J].
Kumar, Vimal ;
Kumar, Rakesh .
SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 :110-121
[20]   Efficient password authenticated key agreement using smart cards [J].
Juang, WS .
COMPUTERS & SECURITY, 2004, 23 (02) :167-173