Font Size: a A A

An Authentication Scheme Based On Identity Information Design And Analysis

Posted on:2011-12-22Degree:MasterType:Thesis
Country:ChinaCandidate:H C LuoFull Text:PDF
GTID:2208360308967343Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Nowadays, many commercial activities, government business and Family Activities transfer information on network which has become more open and vulnerable. Such as Internet, mobile networks and so on. So every user pay more attention to the security, reliability and authenticity of networks.Currently, lots of researchers proposed a variety of authentication protocols based on smart card. The authentication protocols are founded on the assumption that the contents of the smart card will not be leaked. However, many recent studies show that an attacker can obtain the protected information on the smart card, through analyze the disclosure information. Even directly access the secret information on the smart card by the some special methods. To overcome the shortcomings, a fingerprint-based remote authentication scheme has been proposed.Generally speaking, it is thought that fingerprints are not forged. And relative to other biological information, the acquisition technology of fingerprint has matured, which has been widely used in society. Biometrics provides a convenient, reliable and cost-effective means for providing high security and other value-added benefits to the client. In addition, mobile devices, such as notebooks, mobile phones and personal digital assistants, are used increasingly. Moreover, fingerprint sensors embedded into mobile devices will be a trend in the future. So we use mobile devices, instead of the smart card. Meanwhile, the password and fingerprint have been combined in authentication protocols to resolve the threat, such as fingerprint disclosure. In this program the bilinear pairing and hash function will be used to enhance the security of the system. In this paper, some analysis of the counter-attack capacity has been taken...
Keywords/Search Tags:Identity authentication, bilinear pairing, smart card, fingerprint, security
PDF Full Text Request
Related items