A New Password Authentication Scheme Using Fuzzy Extractor with Smart Card

In this paper, a new biometric authentication scheme based on fingerprint is proposed. To the best knowledge of us, this is the first biometric authentication scheme which is combined with fuzzy extractor and smart card. Futhermore, this scheme has improved the security flaws of previous schemes and can be suitable to the use of ATM, e-bank, and e-commerce etc. due to its convenience and simplicity. Meanwhile, our scheme is securer than the previous due to using of password and biometric authentication.

[1]  Jing Xu,et al.  Improvement of a Fingerprint-Based Remote User Authentication Scheme , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[2]  Choong Seon Hong,et al.  An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards , 2007 .

[3]  Manoj Kumar,et al.  A Secure Remote User Authentication Scheme with Smart Cards , 2008, IACR Cryptol. ePrint Arch..

[4]  Wolfgang A. Halang,et al.  Cryptanalysis of an image encryption scheme based on a compound chaotic sequence , 2007, Image Vis. Comput..

[5]  Rafail Ostrovsky,et al.  Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.

[6]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[7]  H. Farmer A new perspective. , 1988, The Journal of the Florida Medical Association.

[8]  Guanrong Chen,et al.  Cryptanalysis of an image encryption scheme based on the Hill cipher , 2007, ArXiv.

[9]  Xavier Boyen,et al.  Reusable cryptographic fuzzy extractors , 2004, CCS '04.

[10]  Min Gyo Chung,et al.  More secure remote user authentication scheme , 2009, Comput. Commun..

[11]  Muhammad Khurram Khan,et al.  An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards , 2006, ISPEC.

[12]  Jonathan Katz,et al.  Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets , 2006, CRYPTO.

[13]  Neil Haller,et al.  The S/KEY One-Time Password System , 1995, RFC.

[14]  N. Nagaraj,et al.  Cryptanalysis of a Chaotic Image Encryption Algorithm , 2008, 0801.0276.

[15]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[16]  Xinghuo Yu,et al.  A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications , 2006, ICB.

[17]  Eun-Jun Yoon,et al.  Biometrics Authenticated Key Agreement Scheme , 2006, NGITS.