Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Key binding biometrics‐based remote user authentication scheme using smart cards

View through CrossRef
Remote user authentication schemes using smart cards provide solutions for securing user authentication. The schemes rely on passwords or biometric or both, which fall apart if the password is not kept secret. Additionally, the passwords can be stolen, lost, or forgotten and the stored biometric template is highly susceptible to a number of security and privacy attacks. This study presents a new biometric‐based remote user authentication scheme using smart cards. In this study, the cryptographic key is concealed with a biometric template and discarded in the registration phase. During the login phase, the key is generated using a query biometric template in such a way that the key cannot be retrieved without a successful biometric verification. The strength of the proposed scheme is that it provides resistance to tampering and theft by way of a stored biometric template, privileged insider, and a smart card attacks and achieves some good properties such as it works without password (human memorised) and provides renewable property for the protected biometric template. Additionally, this scheme combines the good features of previous works to further capitalise on their sound security and design features. Security and performance analysis of the proposed scheme shows the advantage over other existing schemes.
Institution of Engineering and Technology (IET)
Title: Key binding biometrics‐based remote user authentication scheme using smart cards
Description:
Remote user authentication schemes using smart cards provide solutions for securing user authentication.
The schemes rely on passwords or biometric or both, which fall apart if the password is not kept secret.
Additionally, the passwords can be stolen, lost, or forgotten and the stored biometric template is highly susceptible to a number of security and privacy attacks.
This study presents a new biometric‐based remote user authentication scheme using smart cards.
In this study, the cryptographic key is concealed with a biometric template and discarded in the registration phase.
During the login phase, the key is generated using a query biometric template in such a way that the key cannot be retrieved without a successful biometric verification.
The strength of the proposed scheme is that it provides resistance to tampering and theft by way of a stored biometric template, privileged insider, and a smart card attacks and achieves some good properties such as it works without password (human memorised) and provides renewable property for the protected biometric template.
Additionally, this scheme combines the good features of previous works to further capitalise on their sound security and design features.
Security and performance analysis of the proposed scheme shows the advantage over other existing schemes.

Related Results

The learning credit card: A tool for managing personal development*
The learning credit card: A tool for managing personal development*
AbstractThis is the report of a five month study, undertaken by Sundridge Park Training Technologies in association with Guildford Educational Services to assess the potential of s...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively ...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
A KCP-DCNN-Based Two-Step Verification Multimodal Biometric Authentication System featuring QR Code Fabrication
A KCP-DCNN-Based Two-Step Verification Multimodal Biometric Authentication System featuring QR Code Fabrication
Abstract Starting with for, need change Enhanced authentication performance, the concept of multi-biometrics authentication systems has emerged as a promising solution in t...
Faktor Risiko Mortalitas Pasien COVID-19 Acute Respiratory Distress Syndrome di RSUD Al-Ihsan
Faktor Risiko Mortalitas Pasien COVID-19 Acute Respiratory Distress Syndrome di RSUD Al-Ihsan
Abstract. Acute Respiratory Distress Syndrome (ARDS) is a common complications in COVID-19 patients. The prevalence of ARDS caused by COVID-19, which is subsequently referred to as...
Behavioral Biometrics in the European Union: Legal Challenges and Technological Prospects
Behavioral Biometrics in the European Union: Legal Challenges and Technological Prospects
Objective: to study the historical development of the European Union legislation on behavioral biometrics; to identify the features of the European approach to the regulation of be...

Back to Top