Leakage-resilient biometric-based remote user authentication with fuzzy extractors

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Remote three-factor authentication scheme based on Fuzzy extractors

In order to provide high-security remote authentication, the three-factor authentication scheme combining biometric with smart card and password has been proposed. With a careful review of the recently proposed Lee–Hsu’s scheme, this paper points out some design flaws in it. In order to withstand them, a new scheme based on Fuzzy extractors is proposed. With a detail analysis, this paper demons...

متن کامل

A Robust Biometric-Based Three-factor Remote User Authentication Scheme

The rapid development of Internet of Things (IoT) technology, which is an inter connection of networks through an insecure public channel i.e. Internet demands for authenticating the remote user trying to access the secure network resources. In 2013, Ankita et al. proposed an improved three factor remote user authentication scheme. In this poster we will show that Ankita et al scheme is vulnera...

متن کامل

Alternating Extractors and Leakage-Resilient Stream Ciphers

Last time we proved the Leftover Hash Lemma, which states that if X is a random variable with universe U and H∞(X) ≥ k, ε > 0, and H is a universal hash family of size 2 with output length l = k − 2 log(1/ε), then Ext(x, h) = h(x) is a (k, ε/2) extractor with seed length d and output length m. In other words, Ext(x, h) extracts l bits from x that are ε-close to uniform, with ε = 12 √ 2−l. For a...

متن کامل

Fuzzy Extractors for Minutiae-Based Fingerprint Authentication

We propose an authentication scheme using fingerprint biometrics, protected by a construct called a Fuzzy Extractor. We look at a new way of quantizing and digitally representing the minutiae measurements so that a construct called PinSketch can be applied to the minutiae. This is converted to a Fuzzy Extractor by tying some random information to the minutiae measurements. We run a matching alg...

متن کامل

Biometric Based User Authentication Using Smart Card

Remote user authentication is one of the major issues in the rapid growing internet era. In this paper we propose a biometric based remote user authentication scheme using smart cards. The existing methods failed to be safe in remote user authentication as the secret values in either end of the communication could be guessed by the intruder. In our scheme we introduce an addition security at th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Theoretical Computer Science

سال: 2020

ISSN: 0304-3975

DOI: 10.1016/j.tcs.2020.02.001