[go: up one dir, main page]

Fan et al., 2009 - Google Patents

Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics

Fan et al., 2009

View PDF
Document ID
8857509480176204778
Author
Fan C
Lin Y
Publication year
Publication venue
IEEE Transactions on Information Forensics and Security

External Links

Snippet

A three-factor authentication scheme combines biometrics with passwords and smart cards to provide high-security remote authentication. Most existing schemes, however, rely on smart cards to verify biometric characteristics. The advantage of this approach is that the …
Continue reading at pdfs.semanticscholar.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Similar Documents

Publication Publication Date Title
Fan et al. Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics
Roy et al. Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things
Yu et al. An efficient generic framework for three-factor authentication with provably secure instantiation
Odelu et al. A secure biometrics-based multi-server authentication protocol using smart cards
Das A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications
Yoon et al. Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem
Amin et al. Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems
Amin Cryptanalysis and Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-server Environment Using Smart Card.
Zhu et al. Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data
Dong et al. Cryptographic protocol
Srinivas et al. Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
Chandrakar et al. Cryptanalysis and extended three-factor remote user authentication scheme in multi-server environment
Chakrabarti et al. Password-based authentication: Preventing dictionary attacks
Das et al. A New Biometric-Based Remote User Authentication Scheme in Hierarchical Wireless Body Area Sensor Networks.
Yoon et al. A new biometric-based user authentication scheme without using password for wireless sensor networks
Das et al. A biometric-based user authentication scheme for heterogeneous wireless sensor networks
Giri et al. A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer usb mass storage devices
Tian et al. Pribioauth: Privacy-preserving biometric-based remote user authentication
Al‐Saggaf Key binding biometrics‐based remote user authentication scheme using smart cards
Guo et al. An improved three-factor session initiation protocol using Chebyshev chaotic map
Rana et al. Provably secure authenticated content key distribution framework for IoT-enabled enterprise digital rights management systems
Sammoud et al. A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
Chien et al. Provably secure password-based three-party key exchange with optimal message steps
Mishra et al. An improved biometric–based remote user authentication scheme for connected healthcare
Das An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks