A novel identity authentication technique without trustworthy third-party based on fingerprint verification

  • Authors:
  • Liang Li;Jie Tian;Xin Yang

  • Affiliations:
  • Institute of Automation, Chinese Academy of Sciences, Graduate School of the Chinese Academy of Science, Beijing, China;Institute of Automation, Chinese Academy of Sciences, Graduate School of the Chinese Academy of Science, Beijing, China;Institute of Automation, Chinese Academy of Sciences, Graduate School of the Chinese Academy of Science, Beijing, China

  • Venue:
  • WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Computer networks have evolved from close local networks to open interconnected networks and the operations from data communication to online transaction. As such, identity authentication is indispensable in today's computing platform. Current identity authentication techniques primarily focus on Public Key Infrastructure (PKI) or Identity Based Encryption (IBE). However, these techniques authenticate users' identity relying on tokens or keys and one or many trustworthy third-party(s) that require databases running online, with multiple points of vulnerability and low efficiency.