Javascript must be enabled to continue!
Key binding biometrics‐based remote user authentication scheme using smart cards
View through CrossRef
Remote user authentication schemes using smart cards provide solutions for securing user authentication. The schemes rely on passwords or biometric or both, which fall apart if the password is not kept secret. Additionally, the passwords can be stolen, lost, or forgotten and the stored biometric template is highly susceptible to a number of security and privacy attacks. This study presents a new biometric‐based remote user authentication scheme using smart cards. In this study, the cryptographic key is concealed with a biometric template and discarded in the registration phase. During the login phase, the key is generated using a query biometric template in such a way that the key cannot be retrieved without a successful biometric verification. The strength of the proposed scheme is that it provides resistance to tampering and theft by way of a stored biometric template, privileged insider, and a smart card attacks and achieves some good properties such as it works without password (human memorised) and provides renewable property for the protected biometric template. Additionally, this scheme combines the good features of previous works to further capitalise on their sound security and design features. Security and performance analysis of the proposed scheme shows the advantage over other existing schemes.
Title: Key binding biometrics‐based remote user authentication scheme using smart cards
Description:
Remote user authentication schemes using smart cards provide solutions for securing user authentication.
The schemes rely on passwords or biometric or both, which fall apart if the password is not kept secret.
Additionally, the passwords can be stolen, lost, or forgotten and the stored biometric template is highly susceptible to a number of security and privacy attacks.
This study presents a new biometric‐based remote user authentication scheme using smart cards.
In this study, the cryptographic key is concealed with a biometric template and discarded in the registration phase.
During the login phase, the key is generated using a query biometric template in such a way that the key cannot be retrieved without a successful biometric verification.
The strength of the proposed scheme is that it provides resistance to tampering and theft by way of a stored biometric template, privileged insider, and a smart card attacks and achieves some good properties such as it works without password (human memorised) and provides renewable property for the protected biometric template.
Additionally, this scheme combines the good features of previous works to further capitalise on their sound security and design features.
Security and performance analysis of the proposed scheme shows the advantage over other existing schemes.
Related Results
The learning credit card: A tool for managing personal development*
The learning credit card: A tool for managing personal development*
AbstractThis is the report of a five month study, undertaken by Sundridge Park Training Technologies in association with Guildford Educational Services to assess the potential of s...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively ...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Web-based User Authentication and Access Control: An Enhanced Multi-Factor Biometric Cryptographic Scheme Based on Client File and S13 Quantum Key Distribution Protocol
Web-based User Authentication and Access Control: An Enhanced Multi-Factor Biometric Cryptographic Scheme Based on Client File and S13 Quantum Key Distribution Protocol
Several remote user authentication schemes have been proposed using external memory and smart cards. Smart card-based schemes have user mobility and deployment problems, and those ...
A KCP-DCNN-Based Two-Step Verification Multimodal Biometric Authentication System featuring QR Code Fabrication
A KCP-DCNN-Based Two-Step Verification Multimodal Biometric Authentication System featuring QR Code Fabrication
Abstract
Starting with for, need change Enhanced authentication performance, the concept of multi-biometrics authentication systems has emerged as a promising solution in t...
Faktor Risiko Mortalitas Pasien COVID-19 Acute Respiratory Distress Syndrome di RSUD Al-Ihsan
Faktor Risiko Mortalitas Pasien COVID-19 Acute Respiratory Distress Syndrome di RSUD Al-Ihsan
Abstract. Acute Respiratory Distress Syndrome (ARDS) is a common complications in COVID-19 patients. The prevalence of ARDS caused by COVID-19, which is subsequently referred to as...
Behavioral Biometrics in the European Union: Legal Challenges and Technological Prospects
Behavioral Biometrics in the European Union: Legal Challenges and Technological Prospects
Objective: to study the historical development of the European Union legislation on behavioral biometrics; to identify the features of the European approach to the regulation of be...

