A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA

被引:0
|
作者
Zhu, Lijuan [1 ]
机构
[1] Shanghai JianQiao Coll, Dept Informat Technol, Shanghai, Peoples R China
来源
INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4 | 2013年 / 241-244卷
关键词
Fingerprint; Probabilistic Encryption of RSA; Identity Authentication Protocol;
D O I
10.4028/www.scientific.net/AMM.241-244.2471
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security transaction problem between the client and the server was solved by a network identity authentication protocol of this paper. We designed this protocol from two aspects, one is the hardware structure design, and the other is data encryption. We used fingerprint sensor to gather the user's fingerprint and characteristic value instead of password input from keyboard, and used RSA probabilistic encryption to generate public key and private key of the client and public key and private key of the server, and then used the protocol certification process to finish operation of the data encryption and decryption. This protocol guarantees every specific legitimate user rights and prevents the hacker from attacking network data, and the practical application shows this protocol is absolutely safe.
引用
收藏
页码:2471 / 2474
页数:4
相关论文
共 50 条
  • [21] Identity authentication technology based on fingerprint recognition in CSCW
    Zhang, N
    Yang, ZM
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 1, 2004, : 29 - 33
  • [22] A self-encryption authentication protocol with identity anonymity for teleconference services
    Jiang, YX
    Lin, C
    Shi, MH
    Shen, XM
    GLOBECOM '05: IEEE Global Telecommunications Conference, Vols 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1706 - 1710
  • [23] Anonymous security authentication protocol based on identity encryption for cyber-physical power system
    Li, Xue
    Chen, Jiale
    Jiang, Cheng
    Du, Dajun
    Zhu, Yongsheng
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2023,
  • [24] The Design and Implementation of the Wireless Network Identity Authentication System based on the Hybrid Encryption Algorithm
    Xu, Yongbing
    Wang, Junyi
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ENERGY, ENVIRONMENT AND CHEMICAL ENGINEERING (AEECE 2016), 2016, 89 : 303 - 306
  • [25] Lightweight Secure Identity Authentication Encryption Mechanism Based on OpenFlow Optical Access Network
    Tang Yongli
    Liu Tao
    Li Yiming
    Ye Qing
    Qin Panke
    ACTA OPTICA SINICA, 2019, 39 (09)
  • [26] Weaknesses of fingerprint-based mutual authentication protocol
    Picazo-Sanchez, Pablo
    Ortiz-Martin, Lara
    Peris-Lopez, Pedro
    Bagheri, Nasour
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (12) : 2124 - 2134
  • [27] Network-Authentication Based on Fingerprint and Watermarking
    Wu, Duosheng
    Wang, Fan
    Wang, Xiaolin
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 579 - 582
  • [28] New probabilistic public-key encryption based on the RSA cryptosystem
    Roman'kov, Vitalii A.
    GROUPS COMPLEXITY CRYPTOLOGY, 2015, 7 (02) : 153 - 156
  • [29] Secure AIS with Identity-Based Authentication and Encryption
    Goudosis, A.
    Katsikas, S. K.
    TRANSNAV-INTERNATIONAL JOURNAL ON MARINE NAVIGATION AND SAFETY OF SEA TRANSPORTATION, 2020, 14 (02) : 287 - 298
  • [30] Based on social network theory security identity authentication protocol research on MANET
    Niu, Jie
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 160 - 163