Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
The author first reviews the recently proposed Li-Hwang's biometric-based remote user authentication scheme using smart cards; then shows that the Li-Hwang's scheme has some design flaws in their scheme. In order to withstand those flaws in their scheme, an improvement of their scheme is further proposed. The author also shows that the improved scheme provides strong authentication with the use of verifying biometric, password as well as random nonces generated by the user and the server as compared to that for the Li-Hwang's scheme and other related schemes.
- L. Fan , J.H. Li , H.W. Zhu . An enhancement of timestamp-based password authentication scheme. Comput. Secur. , 7 , 665 - 667
- L. Lamport . Password authentication with insecure communication. Commun. ACM , 770 - 772
- J.J. Shen , C.W. Lin , M.S. Hwang . Security enhancement for the timestamp-based password authentication using smart cards. Comput. Secur. , 7 , 591 - 595
- M.S. Hwang , C.-Y. Liu . Authenticated encryption schemes: current status and key issues. Int. J. Netw. Secur. , 2 , 61 - 73
- N.-Y. Lee , Y.-C. Chiu . Improved remote authentication scheme with smart card. Comput. Standards Interf. , 2 , 177 - 180
- A. Jain , A. Ross , S. Prabhakar . An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. , 1 , 4 - 20
- D. Maltoni , D. Maio , A.K. Jain , S. Prabhakar . (2003) Handbook of fingerprint recognition.
- S. Prabhakar , S. Pankanti , A.K. Jain . Biometric recognition: security and privacy concerns. IEEE Secur. Privacy Mag. , 2 , 33 - 42
- M.K. Khan , J. Zhang , X. Wang . Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaotic Solitons Fractals , 3 , 519 - 524
- C.-T. Li , M.-S. Hwang . An efficient biometric-based remote authentication scheme using smart cards. J. Netw. Comput. Appl. , 1 - 5
- C.-H. Lin , Y.-Y. Lai . A flexible biometric remote user authentication scheme. Comput. Standards Interf. , 1 , 19 - 23
- W. Stallings . (2004) Cryptography and network security: principles and practices.
- Linnartz, J.-P., Tuyls, P.: `New shielding functions to enhance privacy and prevent misuse of biometric templates', Proc. Audio and Video-Based Biometric Person Authentication, 2003, p. 393–402, (LNCS, 2688).
- E.-J. Yoon , E.-K. Ryu , K.-Y. Yoo . An improvement of Hwang-Lee-Tang's simple remote user authentication scheme. Comput. Secur. , 1 , 50 - 56
- Chang, Y.-F., Chang, C.-C., Su, Y.-W.: `A secure improvement on the user-friendly remote authentication with no time concurrency mechanism', Proc. 20th IEEE Int. Conf. on Advanced Information Networking and Applications, 2006, p. 197–213.