A privacy-preserving biometrics based authenticated key agreement scheme using ECC

被引:1
作者
Qi, Mingping [1 ]
Chen, Jianhua [2 ]
机构
[1] Northwestern Polytech Univ, Sch Cybersecur, Xian 710072, Peoples R China
[2] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
关键词
authentication; biometrics; elliptic curve cryptography; key agreement; three factor; SECURE;
D O I
10.1002/dac.4407
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To ensure secure communication over the insecure public network, this work presents a privacy-preserving biometrics-based authenticated key agreement scheme using elliptic curve cryptography, making full use of the advantages that the biometrics can be used to uniquely identify a particular human, and the elliptic curve cryptography can provide the same level security with far less key size compared with other public key cryptography. The proposed scheme realizes the mutual authentication of participants, session key agreement, and various security properties and also can resist kinds of known attacks. Moreover, the proposed scheme has perfect user experience in the aspect of changing password by not interacting with the server. In addition, the security features of our new designed scheme are formally proved under the widely used BPR adversary model. Therefore, from the viewpoint of the authors, the proposed scheme can be considered as the authenticated key agreement scheme for mobile users.
引用
收藏
页数:10
相关论文
共 27 条
  • [1] [Anonymous], 2018, MULTIMEDIA TOOLS APP, DOI DOI 10.1007/s11042-016-4205-5
  • [2] Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Arshad, Hamed
    Nikooghadam, Morteza
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (12)
  • [3] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
  • [4] An enhanced lightweight anonymous biometric based authentication scheme for TMIS
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Khan, Muhammad Khurram
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (05) : 5503 - 5524
  • [5] Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Shon, Taeshik
    Sher, Muhammad
    Farash, Mohammad Sabzinejad
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (06)
  • [6] Robust smart-card-based remote user password authentication scheme
    Chen, Bae-Ling
    Kuo, Wen-Chung
    Wuu, Lih-Chyau
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (02) : 377 - 389
  • [7] A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    Das, Ashok Kumar
    Sharma, Pranay
    Chatterjee, Santanu
    Sing, Jamuna Kanta
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) : 1646 - 1656
  • [8] A novel and efficient lattice-based authenticated key exchange protocol in C-K model
    Gupta, Daya Sagar
    Biswas, G. P.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (03)
  • [9] An ECC-based authenticated group key exchange protocol in IBE framework
    Gupta, Daya Sagar
    Biswas, G. P.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (18)
  • [10] On Securing Bi- and Tri-partite Session Key Agreement Protocol Using IBE Framework
    Gupta, Daya Sagar
    Biswas, G. P.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (03) : 4505 - 4524