2019
DOI: 10.1109/access.2019.2933576
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving RLWE-Based Remote Biometric Authentication Scheme for Single and Multi-Server Environments

Abstract: Lwamo et al. recently proposed a robust and efficient remote single and multi-server biometric authentication scheme using smart card and RSA. The scheme is vulnerable to the smart card lost attacks; therefore, the scheme cannot resist offline guessing attacks and user impersonation attacks, and cannot provide forward security and user anonymity. To address these issues, we propose a new privacy-preserving ring learning with errors (RLWE)-based remote biometric authentication scheme (RRBAS) for single and mult… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 50 publications
0
14
0
Order By: Relevance
“…Generally speaking, key agreement using elliptic-curve cryptography becomes more appealing to achieve less computation overhead. However, it is still computationally expensive [57]. The traditional scheme literally suffers from unresponsive network change, whereby the performance efficiency would be deliberately degraded.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Generally speaking, key agreement using elliptic-curve cryptography becomes more appealing to achieve less computation overhead. However, it is still computationally expensive [57]. The traditional scheme literally suffers from unresponsive network change, whereby the performance efficiency would be deliberately degraded.…”
Section: Discussionmentioning
confidence: 99%
“…It has a registration center to restrict the service access between the cloud server and smart device. It may achieve a proper mutual authentication to secure the communication channel to acquire: (1) the device or user terminal should be legal to gain the server access; (2) the service provider should authenticate the application services to improve system efficiencies; and (3) the client device has a common session key to preserve data confidentiality and user privacy [57].…”
Section: Related Workmentioning
confidence: 99%
“…Such technologies allow people to intuitively enter commands by simply accessing a virtually displayed hologram image, which could be in the form of keys or buttons or PIN projected from an embedded holographic signal emitter. Light detectors, using optical or infrared beams can capture, classify, and diagnose the selected keys and transmit them to the embedded processing unit for analysis [ 42 , 43 ].…”
Section: Big Data Biometric Analytics: a Ct Paradigmmentioning
confidence: 99%
“…As a result, a biometric authentication scheme based on single and multi-server environment was presented for authenticating the key exchange process [13]. Secret key mechanisms are also implemented based on biometric authentication systems [14].…”
Section: Related Workmentioning
confidence: 99%