2014
DOI: 10.4304/jmm.9.9.1069-1074
|View full text |Cite
|
Sign up to set email alerts
|

An Identity Authentication Protocol Based on SM2 and Fingerprint USBkey

Abstract: In order to solve network security problem, we need identity authentication protocol to ensure legal user's authority. Multi-factor identity authentication protocols have more merits than the common identity authentication protocol. This paper analyzes the shortcomings of existing network identity authentication methods, and proposes a new authentication protocol based on S M2 and fingerprint US Bkey. The proposed scheme,which Combines the fingerprint US Bkey of fingerprint certificate with the National cipher… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…In general, the schemes can be classi ed into ve groups in terms of the underlying intractability problem: based on discrete-logarithm problem [5][6][7][8], based on pairing [9,10], based on chaotic map [11][12][13], based on integer-factorization problem [14], and based on hash function [15][16][17][18]. Among them, schemes based on elliptic curve bilinear pairings, such as a robust provable-secure privacy-preserving authentication protocol (PpAP) for Industrial Internet of ings [10], usually require large computation cost.…”
Section: Introductionmentioning
confidence: 99%
“…In general, the schemes can be classi ed into ve groups in terms of the underlying intractability problem: based on discrete-logarithm problem [5][6][7][8], based on pairing [9,10], based on chaotic map [11][12][13], based on integer-factorization problem [14], and based on hash function [15][16][17][18]. Among them, schemes based on elliptic curve bilinear pairings, such as a robust provable-secure privacy-preserving authentication protocol (PpAP) for Industrial Internet of ings [10], usually require large computation cost.…”
Section: Introductionmentioning
confidence: 99%
“…Shabisha et al [23] propose a symmetric keybased authentication scheme that provides anonymity and unlinkability to the fog architecture and is independent of user interaction. Zhang and Liu [24] have proposed a multifactor authentication protocol for short-distance communication between smart devices, but the protocol proposed in the article is suitable for short-distance communication that does not rely on additional hardware. Zhang et al [25] have proposed a three-factor identity authentication scheme based on security outlines and Chebyshev polynomials, which can effectively solve the problems of repeated registration attacks, improper biometric processing, and low system robustness.…”
Section: Introductionmentioning
confidence: 99%
“…ECC algorithm is more favored in communication network authentication, [3] and key distribution [4] scheme. It was proposed by N.Kobliz and V.Miller in 1985 that [2] Curve Cryptography (ECC) is applied to the public key cryptography system, and it is the focus of Elliptic research at home and abroad.…”
mentioning
confidence: 99%