2003
DOI: 10.1145/958965.958969
|View full text |Cite
|
Sign up to set email alerts
|

ID-based password authentication scheme using smart cards and fingerprints

Abstract: This paper proposes two ID-based password authentication schemes, which does not require a dictionary of passwords or verification tables, with smart card and fingerprint. In these schemes, users can change their passwords freely. For a network without synchronization clocks, the proposed nonce-based authentication scheme can withstand message replay attacks . The proposed two schemes require a system to authenticate each user by each user's knowledge, possession, and biometrics, and this feature makes our sch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 76 publications
(29 citation statements)
references
References 6 publications
0
29
0
Order By: Relevance
“…However, while the proposed method is therefore robust toward replay attacks, clock synchronization is required at all the hosts, which is a significant challenge in open network environments. Kim et al (2003) proposed an integrated smart card / fingerprint authentication scheme in which a password list was not maintained at the server such that the users were able to change their passwords at will. Moreover, protection against replay attacks was provided by means of Nonce technology, thereby avoiding the need for clock synchronization at the hosts.…”
Section: Existing Multi-factor Authentication Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, while the proposed method is therefore robust toward replay attacks, clock synchronization is required at all the hosts, which is a significant challenge in open network environments. Kim et al (2003) proposed an integrated smart card / fingerprint authentication scheme in which a password list was not maintained at the server such that the users were able to change their passwords at will. Moreover, protection against replay attacks was provided by means of Nonce technology, thereby avoiding the need for clock synchronization at the hosts.…”
Section: Existing Multi-factor Authentication Methodsmentioning
confidence: 99%
“…In this section, the computational complexity of the proposed scheme is compared with that of the schemes presented by Fan et al (2006), Lin and Lai (2004), Kim et al (2003) and J.K. Lee et al (2002) (see Table 1). Among the various computations performed by the different schemes, the exponential operation in the decryption procedure (E) is the most time consuming.…”
Section: Computational Complexitymentioning
confidence: 99%
“…Since Chang and Wu first presented remote user authentication scheme using smart cards in 1993, there have been many smartcard based authentication schemes [1][2][3]. Most of previous authentication schemes assumed that the smartcard is tamper-resistant [4][5][6][7]. So the remote user authentication schemes using smart cards are not provided against if smart card is easy to forge due to the researches in [8][9].…”
Section: Introductionmentioning
confidence: 99%
“…To solve the problems in the password based authentication, several biometrics-based authentication schemes have been designed [9][10][11][12][13]. There are some advantages of using biometrics as compared to the traditional passwords, which are biometric keys cannot be lost or forgotten, biometric keys are very difficult to copy or share, biometric keys are extremely hard to forge or distribute, biometric keys cannot be guessed easily, and someone's biometrics is not easy to break than others [13].…”
Section: Introductionmentioning
confidence: 99%
“…There are some advantages of using biometrics as compared to the traditional passwords, which are biometric keys cannot be lost or forgotten, biometric keys are very difficult to copy or share, biometric keys are extremely hard to forge or distribute, biometric keys cannot be guessed easily, and someone's biometrics is not easy to break than others [13]. Kim et al proposed an ID-based remote user authentication scheme based on biometrics [9]. They claimed that their scheme is secure against various attacks.…”
Section: Introductionmentioning
confidence: 99%