User Authentication Algorithm Guaranteeing Reusability of Biometric Data in BioPKI System

被引:0
作者
Chae, Cheol-Joo [1 ]
Cho, Han-Jin [2 ]
机构
[1] Korea Natl Coll Agr & Fisheries, Jeonju, South Korea
[2] Far East Univ, Dept Smart Mobile, Eumseong, South Korea
关键词
Biometric data authentication; Reuse of biometric data; BioPKI system; User authentication algorithm;
D O I
10.1007/s11277-016-3595-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The PKI system performs mutual authentication, using the private and public keys published by the Certificate Authority. In this system, private keys are protected with a password. Therefore, it has password leak vulnerability. To improve conventional password-based authentication vulnerability, there have been a lot of studies on biometric data-based authentication technologies these days. The BioPKI system in which biometric data authentication technology is applied to the conventional PKI system enables user authentication and digital signature, using the biometric data-based authenticated certificate. However, the biggest problem of this biometric data authentication technology is that once exposed to an attacker, it wouldn't be valid anymore. And concatenates the user's fingerprint information and the fingerprint sequence number to generate a reusable Bio (FP) . With the proposed method, even if the same user use the same fingerprint information it can be generated every time the other biometric data can ensure the re-usability of the end user's fingerprint information. Therefore, this study attempted to propose a way a way to create reusable biometric data and apply it to the BioPKI system. When the proposed method was applied to the BioPKI system, attack complexity increased by approximately 1.8 x 10(12). Therefore, it can make a contribution to improving the reuse of a user's biometric data and security in the BioPKI system.
引用
收藏
页码:67 / 79
页数:13
相关论文
共 12 条
[1]   Bio-Interactive Healthcare Service System Using Lifelog Based Context Computing [J].
Kang, Sung-Kwan ;
Chung, Kyung-Yong ;
Ryu, Joong-Kyung ;
Rim, Kee-Wook ;
Lee, Jung-Hyun .
WIRELESS PERSONAL COMMUNICATIONS, 2013, 73 (02) :341-351
[2]  
Lee H. - W., 2007, KOREA CONTENTS ASS, V5, P32
[3]  
Lee K. - J., 2013, INT C CONVERG TECHNO, V4, P15
[4]  
문현준, 2015, [Journal of Digital Convergence, 디지털융복합연구], V13, P151, DOI 10.14400/JDC.2015.13.6.151
[5]  
Lee Seo Joon,, 2015, [Journal of Digital Convergence, 디지털융복합연구], V13, P227, DOI 10.14400/JDC.2015.13.5.227
[6]   Energy Efficient Distributed Face Recognition in Wireless Sensor Network [J].
Razzak, Muhammad Imran ;
Khan, Muhammad Khurram ;
Alghathbar, Khaled ;
Park, Jong Hyuk .
WIRELESS PERSONAL COMMUNICATIONS, 2011, 60 (03) :571-582
[7]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[8]  
Song C. - G., 2012, J KOREA CONVERGENCE, V3, P13
[9]   Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards [J].
Wen, Fengtong ;
Susilo, Willy ;
Yang, Guomin .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (04) :1747-1760
[10]  
Yoo J. - H., 2013, KOREA INFORM PROCESS, V20, P4