A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA

被引:0
|
作者
Zhu, Lijuan [1 ]
机构
[1] Shanghai JianQiao Coll, Dept Informat Technol, Shanghai, Peoples R China
来源
INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4 | 2013年 / 241-244卷
关键词
Fingerprint; Probabilistic Encryption of RSA; Identity Authentication Protocol;
D O I
10.4028/www.scientific.net/AMM.241-244.2471
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security transaction problem between the client and the server was solved by a network identity authentication protocol of this paper. We designed this protocol from two aspects, one is the hardware structure design, and the other is data encryption. We used fingerprint sensor to gather the user's fingerprint and characteristic value instead of password input from keyboard, and used RSA probabilistic encryption to generate public key and private key of the client and public key and private key of the server, and then used the protocol certification process to finish operation of the data encryption and decryption. This protocol guarantees every specific legitimate user rights and prevents the hacker from attacking network data, and the practical application shows this protocol is absolutely safe.
引用
收藏
页码:2471 / 2474
页数:4
相关论文
共 50 条
  • [41] Identity-based authentication protocol for grid
    Li Hongwei
    JournalofSystemsEngineeringandElectronics, 2008, (04) : 860 - 865
  • [42] Identity-based deniable authentication protocol
    Shi, Y
    Li, J
    ELECTRONICS LETTERS, 2005, 41 (05) : 241 - 242
  • [43] Identity-based authentication protocol for grid
    Li Hongwei
    Sun Shixin
    Yang Haomiao
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (04) : 860 - COVER3
  • [44] Identity Authentication Based on Network Topology
    Hu, Xuqiang
    Lin, Chuanwen
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 97 - 101
  • [45] User authentication protocol based on human memorable password and using RSA
    Park, I
    Park, S
    Oh, B
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 527 - 536
  • [46] User authentication protocol based on human memorable password and using RSA
    Park, I
    Park, S
    Oh, B
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 698 - 707
  • [47] Fingerprint Code Authentication Protocol on Cloud
    Khodabacchus, Muhammad Yaasir
    Soyjaudah, Krishnaraj Madhavjee Sunjiv
    Ramsawok, Gianeswar
    2016 IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND INNOVATIVE BUSINESS PRACTICES FOR THE TRANSFORMATION OF SOCIETIES (EMERGITECH), 2016, : 162 - 166
  • [48] Fingerprint Protected Password Authentication Protocol
    Yang, Chao
    Zhang, Junwei
    Guo, Jingjing
    Zheng, Yu
    Yang, Li
    Ma, Jianfeng
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [49] Probabilistic Encryption - A Comparative Analysis against RSA and ECC
    Creado, Orhio Mark
    Wu, Xianping
    Wang, Yiling
    Le, Phu Dung
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1123 - 1129
  • [50] An Authentication Scheme Using Identity-based Encryption & Blockchain
    Zhou, Beini
    Li, Hui
    Xu, Li
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 561 - 566