中国邮电高校学报(英文) ›› 2008, Vol. 15 ›› Issue (4): 75-80.doi:

• Artificial Intelligence • 上一篇    下一篇

ID-based authentication scheme combined with identity-based encryption with fingerprint hashing

江为强,黄正全,杨义先,田捷,李亮   

  1. Information Security Center, State Key Laboratory of Networking and Switching Technology,
    Beijing University of Posts and Telecommunications, Beijing 100876, China
  • 收稿日期:2008-02-20 修回日期:1900-01-01 出版日期:2008-12-30
  • 通讯作者: 江为强

ID-based authentication scheme combined with identity-based encryption with fingerprint hashing

JIANG Wei-qiang, HUANG Zheng-quan, YANG Yi-xian, TIAN Jie, LI Liang   

  1. Information Security Center, State Key Laboratory of Networking and Switching Technology,
    Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2008-02-20 Revised:1900-01-01 Online:2008-12-30
  • Contact: JIANG Wei-qiang

摘要:

Current identity-based (ID) cryptosystem lacks the mechanisms of two-party authentication and user’s private key distribution. Some ID-based signcryption schemes and ID-based authenticated key agreement protocols have been presented, but they cannot solve the problem completely. A novel ID-based authentication scheme based on ID-based encryption (IBE) and fingerprint hashing method is proposed to solve the difficulties in the IBE scheme, which includes message receiver authenticating the sender, the trusted authority (TA) authenticating the users and transmitting the private key to them. Furthermore, the scheme extends the application of fingerprint authentication from terminal to network and protects against fingerprint data fabrication. The fingerprint authentication method consists of two factors. This method combines a token key, for example, the USB key, with the user’s fingerprint hash by mixing a pseudo-random number with the fingerprint feature. The security and experimental efficiency meet the requirements of practical applications.

关键词:

ID;authentication,;ID-based;encryption,;bilinear;pairing,;fingerprint;authentication,;fingerprint;hashing

Abstract:

Current identity-based (ID) cryptosystem lacks the mechanisms of two-party authentication and user’s private key distribution. Some ID-based signcryption schemes and ID-based authenticated key agreement protocols have been presented, but they cannot solve the problem completely. A novel ID-based authentication scheme based on ID-based encryption (IBE) and fingerprint hashing method is proposed to solve the difficulties in the IBE scheme, which includes message receiver authenticating the sender, the trusted authority (TA) authenticating the users and transmitting the private key to them. Furthermore, the scheme extends the application of fingerprint authentication from terminal to network and protects against fingerprint data fabrication. The fingerprint authentication method consists of two factors. This method combines a token key, for example, the USB key, with the user’s fingerprint hash by mixing a pseudo-random number with the fingerprint feature. The security and experimental efficiency meet the requirements of practical applications.

Key words:

ID authentication;ID-based encryption;bilinear pairing;fingerprint authentication;fingerprint hashing