THREE-FACTOR AUTHENTICATION SCHEME BASED ON SEARCHABLE ENCRYPTION AND BIOMETRIC FINGERPRINT

被引:0
|
作者
Mihailescu, Marius Iulian [1 ]
Nita, Stefania Loredana [2 ]
机构
[1] Dapyx Solut, Dept Res & Dev, Bucharest, Romania
[2] Univ Bucharest, Dept Comp Sci, Bucharest, Romania
关键词
multi-factor; three factor authentication; searchable encryption; RSA; authentication; biometrics; fingerprint; MULTIFACTOR AUTHENTICATION; SYMMETRIC-ENCRYPTION; KEYWORD SEARCH; SECURITY;
D O I
10.1109/comm48946.2020.9141956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The current paper is proposing a three-factor authentication (3FA) scheme based on three components. In the first component a token and a password will be generated (this module represents the kernel of the three-factor authentication scheme - 3FA). In the second component a pass-code will be generated, using to the token resulted in the first phase. We will use RSA for encryption and decryption of the generated values (token and pass-code). For the token ID and passcode the user will use his smartphone. The third component uses a searchable encryption scheme, whose purpose is to retrieve the documents of the user from the cloud server, based on a keyword and his/her fingerprint. The documents are stored encrypted on a mistrust server (cloud environment) and searchable encryption will help us to search specific information and to access those documents in an encrypted content. We will introduce also a software simulation developed in C# 8.0 for our scheme and a source code analysis for the main algorithms.
引用
收藏
页码:139 / 144
页数:6
相关论文
共 50 条
  • [1] A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments
    Mihailescu, Marius Iulian
    Nita, Stefania Loredana
    CRYPTOGRAPHY, 2022, 6 (01)
  • [2] Remote three-factor authentication scheme based on Fuzzy extractors
    Zhang, Min
    Zhang, Jiashu
    Zhang, Ying
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 682 - 693
  • [3] Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
    Qi Jiang
    Fushan Wei
    Shuai Fu
    Jianfeng Ma
    Guangsong Li
    Abdulhameed Alelaiwi
    Nonlinear Dynamics, 2016, 83 : 2085 - 2101
  • [4] Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
    Jiang, Qi
    Wei, Fushan
    Fu, Shuai
    Ma, Jianfeng
    Li, Guangsong
    Alelaiwi, Abdulhameed
    NONLINEAR DYNAMICS, 2016, 83 (04) : 2085 - 2101
  • [5] BIOMETRIC BASED THREE-FACTOR MUTUAL AUTHENTICATION SCHEME FOR ELECTRONIC PAYMENT SYSTEM USING ELLIPTIC CURVE CRYPTOGRAPHY
    Malathi, D.
    Sasikaladevi, N.
    MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2020, : 39 - 60
  • [6] Improved ECC-Based Three-Factor Multiserver Authentication Scheme
    Wu, Tsu-Yang
    Yang, Lei
    Lee, Zhiyuan
    Chen, Chien-Ming
    Pan, Jeng-Shyang
    Islam, S. K. Hafizul
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [7] A secure three-factor authentication scheme for IoT environments
    Mirsaraei, AmirHossein Ghafouri
    Barati, Ali
    Barati, Hamid
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 169 : 87 - 105
  • [8] A Lightweight Three-Factor Authentication Scheme for WHSN Architecture
    Almuhaideb, Abdullah M.
    Alqudaihi, Kawther S.
    SENSORS, 2020, 20 (23) : 1 - 31
  • [9] The fingerprint identity-based encryption scheme based on IBE and fingerprint authentication
    Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    Beijing Youdian Daxue Xuebao, 2006, SUPPL. 2 (19-23+29):
  • [10] A robust embedded biometric authentication system based on fingerprint and chaotic encryption
    Murillo-Escobar, M. A.
    Cruz-Hernandez, C.
    Abundiz-Perez, F.
    Lopez-Gutierrez, R. M.
    EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (21) : 8198 - 8211