THREE-FACTOR AUTHENTICATION SCHEME BASED ON SEARCHABLE ENCRYPTION AND BIOMETRIC FINGERPRINT

被引:0
|
作者
Mihailescu, Marius Iulian [1 ]
Nita, Stefania Loredana [2 ]
机构
[1] Dapyx Solut, Dept Res & Dev, Bucharest, Romania
[2] Univ Bucharest, Dept Comp Sci, Bucharest, Romania
关键词
multi-factor; three factor authentication; searchable encryption; RSA; authentication; biometrics; fingerprint; MULTIFACTOR AUTHENTICATION; SYMMETRIC-ENCRYPTION; KEYWORD SEARCH; SECURITY;
D O I
10.1109/comm48946.2020.9141956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The current paper is proposing a three-factor authentication (3FA) scheme based on three components. In the first component a token and a password will be generated (this module represents the kernel of the three-factor authentication scheme - 3FA). In the second component a pass-code will be generated, using to the token resulted in the first phase. We will use RSA for encryption and decryption of the generated values (token and pass-code). For the token ID and passcode the user will use his smartphone. The third component uses a searchable encryption scheme, whose purpose is to retrieve the documents of the user from the cloud server, based on a keyword and his/her fingerprint. The documents are stored encrypted on a mistrust server (cloud environment) and searchable encryption will help us to search specific information and to access those documents in an encrypted content. We will introduce also a software simulation developed in C# 8.0 for our scheme and a source code analysis for the main algorithms.
引用
收藏
页码:139 / 144
页数:6
相关论文
共 50 条
  • [41] A Novel Fingerprint-Based Biometric Encryption
    Liang, Bin
    Wu, Zhendong
    LinYou
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 146 - 150
  • [42] Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
    Zhao, Yan
    Li, Shiming
    Jiang, Liehui
    Liu, Tieming
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04):
  • [43] A Robust Privacy-Preserving ECC-Based Three-Factor Authentication Scheme for Metaverse Environment
    Thakur, Garima
    Kumar, Pankaj
    Chen, Chein-Ming
    Vasilakos, Athanasios V.
    Anchna
    Prajapat, Sunil
    COMPUTER COMMUNICATIONS, 2023, 211 : 271 - 285
  • [44] A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
    Sammoud, Amal
    Chalouf, Mohamed Aymen
    Hamdi, Omessaad
    Montavont, Nicolas
    Bouallegue, Ammar
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1916 - 1921
  • [45] Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Rodrigues, Joel J. P. C.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (06) : 3144 - 3153
  • [46] A Novel Mutual Authentication Scheme Based on Fingerprint Biometric and Nonce Using Smart Cards
    Wang, De-song
    Li, Jian-ping
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2011, 5 (04): : 1 - 12
  • [47] A Searchable Symmetric Encryption Scheme Based on SRE
    Huang Y.
    Yu B.
    Li S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (12): : 2725 - 2736
  • [48] LEARNING WITH ERROR BASED SEARCHABLE ENCRYPTION SCHEME
    Zhang Jiuling
    Deng Beixing
    Li Xing
    JournalofElectronics(China), 2012, 29 (05) : 473 - 476
  • [49] Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Arshad, Hamed
    Nikooghadam, Morteza
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (12)
  • [50] An improved and provably secure three-factor user authentication scheme for wireless sensor networks
    Fan Wu
    Lili Xu
    Saru Kumari
    Xiong Li
    Peer-to-Peer Networking and Applications, 2018, 11 : 1 - 20