ID-based authentication scheme combined with identity-based encryption with fingerprint hashing

来源 :The Journal of China Universities of Posts and Telecommunica | 被引量 : 0次 | 上传用户:fanjing0
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Current identity-based (ID) cryptosystem lacks the mechanisms of two-party authentication and user’s private key distribution. Some ID-based signcryption schemes and ID-based authenticated key agreement protocols have been presented, but they cannot solve the problem completely. A novel ID-based authentication scheme based on ID-based encryption (IBE) and fingerprint hashing method is proposed to solve the difficulties in the IBE scheme, which includes message receiver authenticating the sender, the trusted authority (TA) authenticating the users and transmitting the private key to them. Furthermore, the scheme extends the application of fingerprint authentication from terminal to network and protects against fingerprint data fabrication. The fingerprint authentication method consists of two factors. This method combines a token key, for example, the USB key, with the user’s fingerprint hash by mixing a pseudo-random number with the fingerprint feature. The security and experimental efficiency meet the requirements of practical applications. Some ID-based signcryption schemes and ID-based authenticated key agreement protocols have been presented, but they can not solve the problem completely. A novel ID-based authentication scheme based on ID-based encryption (IBE) and fingerprint hashing method is proposed to solve the difficulties in the IBE scheme, which includes message receiver authenticating the sender, the trusted authority (TA) authenticating the users and transmitting the private key to them. The scheme extends the application of fingerprint authentication from terminal to network and protects against fingerprint data fabrication. The fingerprint authentication method consists of two factors. This method combines a token key, for example, the USB key, with the user’s fingerprint hash by mixing a pseudo-random number with the fingerprint feature. The security and experimenta l efficiency meet the requirements of practical applications.
其他文献
新中国已经走过了六十年的光辉历程。中国的司法制度,随着新中国的建立和日益强盛,也走过了六十年不平凡的发展道路。值此建国六十周年大庆之际,回顾了新中国司法制度
会议
众所周知,“党的领导、人民当家作主与依法治国有机统一”乃是中国宪法的根本原则,与戴雪所阐释的英国宪法原则之“议会至上”与“法律主治”可以类比。英国宪法与中国宪法还有
会议
本文回顾了新中国成立60年来刑法学的发展历程,主要围绕刑法起草与新中国刑法学的起步阶段、1979年刑法的颁布和刑法学研究的复苏与繁荣阶段以及刑法修改与刑法学的现代化阶段
改革现有的各级党委总揽一切的执政体制的困难首先在于观念上存在着党的领导与执政、党的领导方式与执政方式、党的领导和执政与党委领导和执政的混淆。从中共既有执政方式、
对于我国民营航天公司的出现及发展状况,记者专访了在国家航天系统工作数十年、年逾80岁的航天技术专家黄志澄.rn黄志澄说,我国民营航天公司现在处于萌芽阶段,所谓的民营航天
期刊
不是害虫,但也不是益鸟,只是一个心中狐疑的家伙。今年5月,慕容雪村在微博上发布公开信.斥责盛大文学不按期支付版权费。而在此之前的3月15日.他和贾平 Not a pest, but it
司法有广义和狭义之说。从广义讲,司法又称之为“法的适用”,是指国家司法机关依据法定职权和法定程序,具体应用法律处理案件的专门活动,不同于其他国家机关、社会组织和公民实施
会议
在社会的重要转型时期,人们总会重新诠释人的尊严,以确立现实社会的价值取向和人的精神归宿。宪法学视角下人性尊严的核心内涵是指人基于人之为人的本性而具有的不可侵犯、不可
会议
“公民”概念①是指称与具有完整主权特征的现代政治国家相对应的、作为主权国家构成要素之一的“居民”个人。在现代社会中,“公民”意味着个人属于一个具有独立完整主权、
会议
回顾新中国立法发展的六十年历程,可以看到,它走过的是一条“山重水复”到“柳暗花明”的曲折道路。其间忽兴忽废,大起大落,在1978年改革开放后终于迎来蓬勃发展的新阶段。1949年
会议