Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2005.12C.7.959

Enhanced ID-based Authentication Scheme using Smartcards and Fingerprints  

Jeon Il-Soo (금오공과대학교 전자공학부)
Kim Hyun-Sung (경일대학교 컴퓨터공학부)
Abstract
Recently, Kim et al. proposed ID-based authentication schemes using smartcards and fingerprints. However, Scott showed that they were vulnerable to the passive eavesdropping attack. Thereby, this paper proposes an enhanced ID-based authentication scheme to solve the problems in Kin et al. scheme. Especially, the proposed scheme solves the ID repairability problem commonly shared in the previous ID based Cryptosystems. The proposed ID-based authentication scheme supports the advantages in the previous ID-based authentication scheme and solves the problems in them effectively.
Keywords
Authentication Scheme; Smartcard; Fingerprint; ID Repairability;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Scott, 'Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints,' Cryptology ePrint Archive : Report 2004/017, http://eprint.iacr.org/2004/017, 2004
2 S. J. Wang and J. F. Chang, 'Smart card based secure authentication scheme,' Computers and Security, Vol.15, No.3, pp.231 -237, 1996   DOI   ScienceOn
3 W. H. Yang and S. P. Shieh, 'Password authentication schemes with smart cards,' Computers and Security, Vol.18, No.8, pp.727-733, 1999   DOI   ScienceOn
4 H. S. Kim, S. W. Lee, and K. Y. Yoo, 'ID-based Password Authentication Scheme using Smart Cards and Fingerprints,' ACM Operating Systems Review, pp.32-41, 2003   DOI
5 S. Tsujii and K. Kurosawa, 'ID-based cryptosystem,' ISEC89-51, pp.25-31, 1989
6 A. Shamir, 'Identity-based cryptosystems and signature schemes,' CRYPTO'84., pp.47-53, 1985
7 E. Okamoto and K. Tanaka, 'Key distribution system based on identification information,' Proc. GLOBECON'87, pp.108-111, 1987
8 S. P. Shieh, W. H. Yang, and H. M. Sun, 'An authentication protocol without trusted third party,' IEEE Commun. Lett., Vol.1, pp.87-89, 1997   DOI   ScienceOn
9 S-M. Yen, 'Cryptanalysis of an authentication and key distribution protocol,' IEEE Commun Lett., Vol.3, pp.7-8, 1999   DOI   ScienceOn
10 Diffie W. and Hellman M. E., 'New directions in cryptography,' IEEE Trans., IT-22, No.6, pp.644-654, 1976   DOI