Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme

被引:43
作者
Bian, Weixin [1 ,2 ]
Gope, Prosanta [3 ]
Cheng, Yongqiang [4 ]
Li, Qingde [4 ]
机构
[1] Anhui Normal Univ, Sch Comp & Informat, Wuhu 241002, Peoples R China
[2] Anhui Prov Key Lab Network & Informat Secur, Wuhu 241002, Peoples R China
[3] Univ Sheffield, Dept Comp Sci, Sheffield, S Yorkshire, England
[4] Univ Hull, Kingston Upon Hull, N Humberside, England
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 109卷
关键词
Mutual authentication; Key agreement; Physical unclonable functions; Fuzzy extractor; Biometric security and privacy; MOBILE DEVICE INTEGRATION; REMOTE; BIOMETRICS; SECURITY;
D O I
10.1016/j.future.2020.03.034
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The fingerprint has long been used as one of the most important biological features in the field of biometrics. It is person-specific and remain identical though out one's lifetime. Physically uncloneable functions (PUFs) have been used in authentication protocols due to the unique physical feature of it. In this paper, we take full advantage of the inherent security features of user's fingerprint biometrics and PUFs to design a new user authentication and key agreement scheme, namely Bio-AKA, which meets the desired security characteristics. To protect the privacy and strengthen the security of biometric data and to improve the robustness of the proposed scheme, the fuzzy extractor is employed. The scheme proposed in the paper can protect user's anonymity without the use of password and allow mutual authentication with key agreement. The experimental results show superior robustness and the simplicity of our proposed scheme has been validated via our performance and security analysis. The scheme can be an ideal candidate for real life applications that requires remote user authentication. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:45 / 55
页数:11
相关论文
共 33 条
[1]   Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards [J].
An, Younghwa .
JOURNAL OF BIOMEDICINE AND BIOTECHNOLOGY, 2012,
[2]   Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond [J].
Barra, Silvio ;
Castiglione, Aniello ;
De Marsico, Maria ;
Nappi, Michele ;
Choo, Kim-Kwang Raymond .
IEEE CLOUD COMPUTING, 2018, 5 (05) :92-+
[3]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[4]   Cryptanalysis of a remote user authentication scheme using smart cards [J].
Chan, CK ;
Cheng, LM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) :992-993
[5]   A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme [J].
Chaturvedi, Ankita ;
Mishra, Dheerendra ;
Jangirala, Srinivas ;
Mukhopadhyay, Sourav .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 32 :15-26
[6]   Mobile device integration of a fingerprint biometric remote authentication scheme [J].
Chen, Chin-Ling ;
Lee, Cheng-Chi ;
Hsu, Chao-Yung .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (05) :585-597
[7]   Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards [J].
Das, A. K. .
IET INFORMATION SECURITY, 2011, 5 (03) :145-151
[8]   Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications [J].
Delvaux, Jeroen ;
Gu, Dawu ;
Verbauwhede, Ingrid ;
Hiller, Matthias ;
Yu, Meng-Day .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 :412-431
[9]   Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J].
Dodis, Yevgeniy ;
Ostrovsky, Rafail ;
Reyzin, Leonid ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2008, 38 (01) :97-139
[10]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472