THREE-FACTOR AUTHENTICATION SCHEME BASED ON SEARCHABLE ENCRYPTION AND BIOMETRIC FINGERPRINT

被引:0
|
作者
Mihailescu, Marius Iulian [1 ]
Nita, Stefania Loredana [2 ]
机构
[1] Dapyx Solut, Dept Res & Dev, Bucharest, Romania
[2] Univ Bucharest, Dept Comp Sci, Bucharest, Romania
关键词
multi-factor; three factor authentication; searchable encryption; RSA; authentication; biometrics; fingerprint; MULTIFACTOR AUTHENTICATION; SYMMETRIC-ENCRYPTION; KEYWORD SEARCH; SECURITY;
D O I
10.1109/comm48946.2020.9141956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The current paper is proposing a three-factor authentication (3FA) scheme based on three components. In the first component a token and a password will be generated (this module represents the kernel of the three-factor authentication scheme - 3FA). In the second component a pass-code will be generated, using to the token resulted in the first phase. We will use RSA for encryption and decryption of the generated values (token and pass-code). For the token ID and passcode the user will use his smartphone. The third component uses a searchable encryption scheme, whose purpose is to retrieve the documents of the user from the cloud server, based on a keyword and his/her fingerprint. The documents are stored encrypted on a mistrust server (cloud environment) and searchable encryption will help us to search specific information and to access those documents in an encrypted content. We will introduce also a software simulation developed in C# 8.0 for our scheme and a source code analysis for the main algorithms.
引用
收藏
页码:139 / 144
页数:6
相关论文
共 50 条
  • [21] A Three-Factor Remote Authentication Scheme for Multi-server Environment
    Cui, Jianming
    Chen, Chen
    Zhang, Xiaojun
    Liu, Yihui
    Cao, Ning
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 694 - 705
  • [22] Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems
    Alanazi, Munayfah
    Nashwan, Shadi
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 42 (02): : 703 - 725
  • [23] Certificateless Authentication Searchable Encryption Scheme for Multi-user
    Zhang Yulei
    Wen Long
    Wang Haohao
    Zhang Yongjie
    Wang Caifen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (05) : 1094 - 1101
  • [24] An authentication and encryption scheme of network management message based on device fingerprint
    Zhang, Dengyin
    Xu, Jinlian
    Cheng, Chunling
    Xue, Qinghan
    Information Technology Journal, 2013, 12 (06) : 1206 - 1212
  • [25] A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city
    Li, Xiong
    Niu, Jianwei
    Kumari, Saru
    Wu, Fan
    Choo, Kim-Kwang Raymond
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 83 : 607 - 618
  • [26] ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
    Wenfeng Huang
    Scientific Reports, 14
  • [27] ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
    Huang, Wenfeng
    SCIENTIFIC REPORTS, 2024, 14 (01)
  • [28] BTh-UAP: Biometric-Based Three-Factor User Authentication Protocol for Wireless Sensor Network
    Fang W.-D.
    Zhang W.-X.
    Yang Y.
    Zhang C.-L.
    Chen W.
    Zhang, Wu-Xiong (wuxiong.zhang@mail.sim.ac.cn), 2018, Chinese Institute of Electronics (46): : 702 - 713
  • [29] Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption
    Kim, Taeyun
    Kim, Hyoungshick
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 813 - 815
  • [30] A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme
    Chaturvedi, Ankita
    Mishra, Dheerendra
    Jangirala, Srinivas
    Mukhopadhyay, Sourav
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 32 : 15 - 26