2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference On 2019
DOI: 10.1109/hpcc/smartcity/dss.2019.00230
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Lightweight Biometric-Based Three-Factor Anonymous Authentication Protocol for Mobile Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…In this scheme, an improved elliptic curve cryptosystem is used to create a secure client/server channel, also a fuzzy extractor algorithm for fingerprint information with the user identity information, and a smartcard used for mutual authentication. Chen H. et al [18] developed a system based on a three-factor (fingerprint, username, and password) and fuzzy extractor for processing the user's Bio-information with a physical smart cart that uses XOR operations and a hash function.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…In this scheme, an improved elliptic curve cryptosystem is used to create a secure client/server channel, also a fuzzy extractor algorithm for fingerprint information with the user identity information, and a smartcard used for mutual authentication. Chen H. et al [18] developed a system based on a three-factor (fingerprint, username, and password) and fuzzy extractor for processing the user's Bio-information with a physical smart cart that uses XOR operations and a hash function.…”
Section: Literature Surveymentioning
confidence: 99%
“…The three protocols [15]- [18] involved the use of a fuzzy extractor algorithm, which required that one of the generated parameters be kept confidential in the mobile device or smart cart. Since both are vulnerable to lost/stolen attacks.…”
Section: Literature Surveymentioning
confidence: 99%
“…Many researchers have designed different authentication schemes [1,[6][7][8][9][10][11][12][13] and methods which comprise different symmetric algorithms such as the Tiny Encryption Algorithm, Advanced Encryption Standard, PRESENT, and Hummingbird, to name a few [14,[15][16][17]. These studies proved that many of the implemented authentication schemes have a pitfall in computation cost and security.…”
Section: Introductionmentioning
confidence: 99%