An anonymous and efficient remote biometrics user authentication scheme in a multi server environment

被引:0
作者
Peng Jiang
Qiaoyan Wen
Wenmin Li
Zhengping Jin
Hua Zhang
机构
[1] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology
来源
Frontiers of Computer Science | 2015年 / 9卷
关键词
biometrics; remote authentication; multi-server architecture; smart card;
D O I
暂无
中图分类号
学科分类号
摘要
As service demands rise and expand single-server user authentication has become unable to satisfy actual application demand. At the same time identity and password based authentication schemes are no longer adequate because of the insecurity of user identity and password. As a result biometric user authentication has emerged as a more reliable and attractive method. However, existing biometric authentication schemes are vulnerable to some common attacks and provide no security proof, some of these biometric schemes are also either inefficient or lack sufficient concern for privacy. In this paper, we propose an anonymous and efficient remote biometric user authentication scheme for a multi-server architecture with provable security. Through theoretical mathematic deduction, simulation implementation, and comparison with related work, we demonstrate that our approach can remove the aforementioned weaknesses and is well suited for a multi-server environment.
引用
收藏
页码:142 / 156
页数:14
相关论文
共 102 条
[31]  
Juang W S(2010)An efficient biometrics-based remote user authentication scheme using smart cards Journal of Network and Computer Applications 33 1-5
[32]  
Tai J L(2011)Cryptanalysis and improvement of a biometric-based remote authentication scheme using smart cards Journal of Network and Computer Applications 34 73-79
[33]  
Hsiang H C(2011)Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards IET Information Security 5 145-151
[34]  
Shih W K(2012)Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme Proceedings of Computational Science and its Applications 7335 391-406
[35]  
Yoon E J(2013)A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps Nonlinear Dynamics 71 201-211
[36]  
Yoo K Y(2008)Activity completion duration based checkpoint selection for dynamic verification of temporal constraints in grid work-flow systems International Journal of High Performance Applications 22 319-329
[37]  
Lee C C(2005)Fuzzy extractors: How to generate strong keys from biometrics and other noisy data In advances in Cryptology-EUROCRYPT 3027 523-540
[38]  
Lin T H(2005)Password-based authenticated key exchange in the three-party setting Procedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography (PKC 2005) 3386 65-84
[39]  
Chang R X(undefined)undefined undefined undefined undefined-undefined
[40]  
Li X(undefined)undefined undefined undefined undefined-undefined