An efficient biometrics-based remote user authentication scheme using smart cards

作者: Chun-Ta Li , Min-Shiang Hwang

DOI: 10.1016/J.JNCA.2009.08.001

关键词:

摘要: In this paper, we propose an efficient biometric-based remote user authentication scheme using smart cards, in which the computation cost is relatively low compared with other related schemes. The security of proposed based on one-way hash function, biometrics verification and card. Moreover, enables to change their passwords freely provides mutual between users server. addition, many schemes use timestamps resist replay attacks. Therefore, synchronized clock required our scheme, it does not require clocks two entities because random numbers place timestamps.

参考文章(38)
Hung-Wen Yang, Ching-Ying Lin, Jau-Ji Shen, Cryptanalysis of a New Efficient MAKEP for Wireless Communications International Journal of Network Security. ,vol. 1, pp. 118- 121 ,(2005)
Christos K. Dimitriadis, Siraj A. Shaikh, A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions International Journal of Network Security. ,vol. 5, pp. 99- 111 ,(2007) , 10.6633/IJNS.200707.5(1).12
Zheng-Quan Li, Bin Wang, A Forward-Secure User Authentication Scheme with Smart Cards International Journal of Network Security. ,vol. 3, pp. 116- 119 ,(2006) , 10.6633/IJNS.200609.3(2).02
Ching-Yung Liu, A Lightweight Security Mechanism for ATM Networks International Journal of Network Security. ,vol. 1, pp. 32- 37 ,(2005)
Chi-Yu Liu, Min-Shiang Hwang, Authenticated Encryption Schemes: Current Status and Key Issues International Journal of Network Security. ,vol. 1, pp. 61- 73 ,(2005)
Da-Zhi Sun, Zhen-Fu Cao, New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme International Journal of Network Security. ,vol. 6, pp. 116- 120 ,(2008)
Chou Chen Yang, Ren-Chiun Wang, Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards International Journal of Network Security. ,vol. 3, pp. 283- 285 ,(2006)
Arslan Broemme, A Risk Analysis Approach for Biometric Authentication Technology International Journal of Network Security. ,vol. 2, pp. 52- 63 ,(2006)
Zhenchuan Chai, Rongxing Lu, Xiaohui Liang, Zhenfu Cao, A Simple User Authentication Scheme for Grid Computing International Journal of Network Security. ,vol. 7, pp. 202- 206 ,(2008) , 10.6633/IJNS.200809.7(2).08
Cheng-Chi Lee, Min-Shiang Hwang, Chwei-Shyong Tsai, Password Authentication Schemes: Current Status and Key Issues International Journal of Network Security. ,vol. 3, pp. 101- 115 ,(2006) , 10.6633/IJNS.200609.3(2).01