A cancelable biometric based secure session key agreement protocol employing elliptic curve cryptography

被引:3
|
作者
Sarkar, Arpita [1 ]
Singh, Binod [1 ]
机构
[1] Natl Inst Technol Jamshedpur, Dept Comp Sci & Engn, Jamshedpur, Bihar, India
关键词
Biometrics; Cancelable template; Key agreement protocol; Elliptic curve cryptography; Network security; 3-FACTOR AUTHENTICATION SCHEME;
D O I
10.1007/s13198-019-00832-7
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cryptography is the common compelling recommendation for reliable communication of data. A cryptographic key is a meaningful thing in this system. Despite, such key demands to be collected in a secured place or carried through a distributed communication line which, in actuality, poses another alert to safety. As a substitute, researchers affirm the creation of cryptographic key utilizing the biometric features of both sender and receiver throughout the sessions of communication, thus bypassing key sharing through the insecure channel and at the very time without imperiling the power in safety. Nonetheless, the biometric-based cryptographic key formation contains few matters so as the secrecy of biometrics, distributing of biometric data among both communicating users, and creating the revocable key of irrevocable biometric. Aforementioned work discusses the above-mentioned concerns. Here a structure for reliable communication among two users using cancelable fingerprint based session key agreement protocol has been suggested. For this, communication a session key is created by both communicating parties at their end using their cancelable fingerprint biometrics. In this aforementioned method, each original biometric data is converted into a cancelable biometric data and the revocable key for session key agreement protocol is created from the cancelable fingerprint of the communicating parties. For better performance and security purposes, all the actions of this protocol are based on elliptic curve cryptography. Proposed protocol precludes undesired third-parties from requiring a key selection on this agreeing parties. Based on the experimental evaluation across four datasets of FVC2002, the proposed structure is privacy-preserving and is excellently fitting for various real-time biometric-based applicability.
引用
收藏
页码:1023 / 1042
页数:20
相关论文
共 50 条
  • [21] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zhang, Zezhong
    Qi, Qingqing
    Kumar, Neeraj
    Chilamkurti, Naveen
    Jeong, Hwa-Young
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (10) : 3477 - 3488
  • [22] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zezhong Zhang
    Qingqing Qi
    Neeraj Kumar
    Naveen Chilamkurti
    Hwa-Young Jeong
    Multimedia Tools and Applications, 2015, 74 : 3477 - 3488
  • [23] An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) : 1801 - 1815
  • [24] An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
    Yanrong Lu
    Lixiang Li
    Haipeng Peng
    Yixian Yang
    Multimedia Tools and Applications, 2017, 76 : 1801 - 1815
  • [25] A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography
    Wu, Fan
    Xu, Lili
    Li, Xiong
    Kumari, Saru
    Karuppiah, Marimuthu
    Obaidat, Mohammad S.
    IEEE SYSTEMS JOURNAL, 2019, 13 (03): : 2830 - 2838
  • [26] Conference key agreement protocol based on elliptic curve
    Cai, Yong-Quan
    Wang, Ya-Li
    Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology, 2007, 33 (08): : 870 - 873
  • [27] Mutual authentication and key agreement based on Elliptic Curve Cryptography for GSM
    Ammayappan, Kavitha
    Saxena, Ashutosh
    Negi, Atul
    2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, 2007, : 177 - +
  • [28] A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
    Chen, Yulei
    Chen, Jianhua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (11) : 16009 - 16032
  • [29] A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
    Yulei Chen
    Jianhua Chen
    Multimedia Tools and Applications, 2023, 82 : 16009 - 16032
  • [30] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jong Sung
    2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,