Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices

被引:103
作者
Khan, Muhammad Khurram [1 ]
Zhang, Jiashu [1 ]
Wang, Xiaomin [1 ]
机构
[1] SW Jiao Tong Univ, Sichuan Prov Key Lab Signal & Informat Proc, Res Grp Biomet & Secur, Chengdu 610031, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1016/j.chaos.2006.05.061
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper presents an efficient and practical chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices e.g. cell phone and PDA. Our scheme is completely based on the new family of one-way collision free chaotic hash functions, which are much efficient than modular exponentiation-based authentication schemes e.g. RSA. Proposed scheme is two-factor authentication scheme and a user has to identify him with: something he knows (e.g. password) and something he is (e.g. fingerprint biometric). Security analysis shows that the proposed scheme provides secure, robust, and trustworthy remote authentication of mobile users over insecure network. In addition, computational costs and efficiency of the proposed scheme are encouraging for the practical implementation in the real environment. (C) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:519 / 524
页数:6
相关论文
共 17 条
[1]  
Bellare M, 1996, LNCS, V1109, P1
[2]  
BOER B, 1994, LNCS, V765, P293
[3]   CHAOS SHIFT KEYING - MODULATION AND DEMODULATION OF A CHAOTIC CARRIER USING SELF-SYNCHRONIZING CHUA CIRCUITS [J].
DEDIEU, H ;
KENNEDY, MP ;
HASLER, M .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-ANALOG AND DIGITAL SIGNAL PROCESSING, 1993, 40 (10) :634-642
[4]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[5]  
Hsu CL, 2004, COMP STAND INTER, V26, P167, DOI [10.1016/S0920-5489(03)00094-1, 10.1016/s0920-5489(03)00094-1]
[6]   A new remote user authentication scheme using smart cards [J].
Hwang, MS ;
Li, LH .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :28-30
[7]   On-line fingerprint verification [J].
Jain, A ;
Hong, L ;
Bolle, R .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1997, 19 (04) :302-314
[8]   Hiding biometric data [J].
Jain, AK ;
Uludag, U .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2003, 25 (11) :1494-1498
[9]  
KHAN MK, IN PRESS CHAOS SOLIT
[10]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772