Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol

被引:8
作者
Zhang, Liping [1 ,2 ]
Tang, Shanyu [1 ]
Zhu, Shaohui [1 ]
机构
[1] China Univ Geosci, Coll Comp Sci, 388 Lumo Rd, Wuhan 430074, Peoples R China
[2] Univ Florida, Comp Informat Sci & Engn, Gainesville, FL 32611 USA
基金
中国国家自然科学基金;
关键词
Biometrics; Privacy protection; User anonymity; Session initiation protocol; VoIP; PROVABLY SECURE AUTHENTICATION; LOGIC;
D O I
10.1007/s11276-016-1267-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secure key agreement scheme plays a major role in protecting communications between the users using voice over internet protocol over a public network like the internet. In this paper we present a strong security authenticated key agreement scheme for session initiation protocol (SIP) by using biometrics, passwords and smart cards. The proposed scheme realizes biometric data protection through key agreement process meanwhile achieving the verification of the biometric value on the SIP server side which is very important in designing a practical authenticated key agreement for SIP. The main merits of our proposed scheme are: (1) the SIP server does not need to maintain any password or verification table; (2) the scheme can provide user identity protection-the user's real identity is protected by a secure symmetric encryption algorithm and the elliptic curve discrete logarithm problem, and it is transmitted in code; (3) the scheme can preserve the privacy of the user's biometric data while the biometric matching algorithm is performed at the SIP server side, even if the server does not know the biometric data in the authentication process. Performance and security analysis shows that our proposed scheme increases efficiency significantly in comparison with other related schemes.
引用
收藏
页码:1901 / 1916
页数:16
相关论文
共 31 条
[1]  
Alcaide A, 2011, LECT NOTES COMPUT SC, V6514, P108, DOI 10.1007/978-3-642-19348-4_9
[2]  
[Anonymous], P AUSCERT AS PAC INF
[3]   Ubiquitous iris recognition by means of mobile devices [J].
Barra, Silvio ;
Casanova, Andrea ;
Narducci, Fabio ;
Ricciardi, Stefano .
PATTERN RECOGNITION LETTERS, 2015, 57 :66-73
[4]  
Brown M, 2001, LECT NOTES COMPUT SC, V2020, P250
[5]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[6]  
Eun-Jun Yoon, 2010, Proceedings of the 2010 Fourth International Conference on Network and System Security (NSS 2010), P334, DOI 10.1109/NSS.2010.101
[7]   Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics [J].
Fan, Chun-I ;
Lin, Yi-Hui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (04) :933-945
[8]  
Gong L., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P234, DOI 10.1109/RISP.1990.63854
[9]  
Han K., 2008, S CRYPT INF SEC MIYA, P1
[10]  
Hankerson D, 2001, LECT NOTES COMPUT SC, V1965, P1