Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
A critique of the Burrows, Abadi and Needham logic
ACM SIGOPS Operating Systems Review
Toward Reliable User Authentication through Biometrics
IEEE Security and Privacy
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
ID-based password authentication scheme using smart cards and fingerprints
ACM SIGOPS Operating Systems Review
Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints
ACM SIGOPS Operating Systems Review
Remarks on fingerprint-based remote user authentication scheme using smart cards
ACM SIGOPS Operating Systems Review
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Privacy preserving multi-factor authentication with biometrics
Journal of Computer Security - The Second ACM Workshop on Digital Identity Management - DIM 2006
On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
An improved fingerprint-based remote user authentication scheme using smart cards
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
A new efficient fingerprint-based remote user authentication scheme for multimedia systems
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Protecting Biometric Templates With Sketch: Theory and Practice
IEEE Transactions on Information Forensics and Security - Part 2
Journal of Network and Computer Applications
An integrated scheme based on service classification in pervasive mobile services
International Journal of Communication Systems
An enhanced biometrics-based remote user authentication scheme using mobile devices
International Journal of Computational Intelligence Studies
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
A three-factor authentication scheme combines biometrics with passwords and smart cards to provide high-security remote authentication. Most existing schemes, however, rely on smart cards to verify biometric characteristics. The advantage of this approach is that the user's biometric data is not shared with remote server. But the disadvantage is that the remote server must trust the smart card to perform proper authentication which leads to various vulnerabilities. To achieve truly secure three-factor authentication, a method must keep the user's biometrics secret while still allowing the server to perform its own authentication. Our method achieves this. The proposed scheme fully preserves the privacy of the biometric data of every user, that is, the scheme does not reveal the biometric data to anyone else, including the remote servers. We demonstrate the completeness of the proposed scheme through the GNY (Gong, Needham, and Yahalom) logic. Furthermore, the security of our proposed scheme is proven through Bellare and Rogaway's model. As a further benefit, we point out that our method reduces the computation cost for the smart card.