A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA

被引:0
|
作者
Zhu, Lijuan [1 ]
机构
[1] Shanghai JianQiao Coll, Dept Informat Technol, Shanghai, Peoples R China
关键词
Fingerprint; Probabilistic Encryption of RSA; Identity Authentication Protocol;
D O I
10.4028/www.scientific.net/AMM.241-244.2471
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security transaction problem between the client and the server was solved by a network identity authentication protocol of this paper. We designed this protocol from two aspects, one is the hardware structure design, and the other is data encryption. We used fingerprint sensor to gather the user's fingerprint and characteristic value instead of password input from keyboard, and used RSA probabilistic encryption to generate public key and private key of the client and public key and private key of the server, and then used the protocol certification process to finish operation of the data encryption and decryption. This protocol guarantees every specific legitimate user rights and prevents the hacker from attacking network data, and the practical application shows this protocol is absolutely safe.
引用
收藏
页码:2471 / 2474
页数:4
相关论文
共 50 条
  • [1] A Network Identity Authentication Protocol of Bank Account System Based on Fingerprint Identification and Mixed Encryption
    Zhu, Lijuan
    Liu, Jingao
    FIFTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2013), 2013, 8878
  • [2] The fingerprint identity-based encryption scheme based on IBE and fingerprint authentication
    Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    Beijing Youdian Daxue Xuebao, 2006, SUPPL. 2 (19-23+29):
  • [3] Authentication system based on RSA encryption
    Zhu, S.R.
    Li, W.Q.
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2001, 22 (08):
  • [4] New probabilistic encryption based on RSA
    Xi'an Dianzi Keji Daxue Xuebao, 4 (554-559):
  • [5] An authentication and encryption scheme of network management message based on device fingerprint
    Zhang, Dengyin
    Xu, Jinlian
    Cheng, Chunling
    Xue, Qinghan
    Information Technology Journal, 2013, 12 (06) : 1206 - 1212
  • [6] ID-based authentication scheme combined with identity-based encryption with fingerprint hashing
    Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
    不详
    J. China Univ. Post Telecom., 2008, 4 (75-80,120):
  • [8] A Identity Authentication Based on Fingerprint Identification
    He, Minwei
    Zhao, Huimin
    2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 261 - 263
  • [9] Identity Based Secure RSA Encryption System
    Jain, Meenal
    Singh, Manoj
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 429 - 437
  • [10] Chaotic Encryption for Fingerprint Authentication
    Aarthi, N. Ganitha
    Jeyaseelan, W. R. Salem
    Oviya, K.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2019, 12 (02): : 70 - 75