A cancelable biometric based secure session key agreement protocol employing elliptic curve cryptography

被引:3
|
作者
Sarkar, Arpita [1 ]
Singh, Binod [1 ]
机构
[1] Natl Inst Technol Jamshedpur, Dept Comp Sci & Engn, Jamshedpur, Bihar, India
关键词
Biometrics; Cancelable template; Key agreement protocol; Elliptic curve cryptography; Network security; 3-FACTOR AUTHENTICATION SCHEME;
D O I
10.1007/s13198-019-00832-7
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cryptography is the common compelling recommendation for reliable communication of data. A cryptographic key is a meaningful thing in this system. Despite, such key demands to be collected in a secured place or carried through a distributed communication line which, in actuality, poses another alert to safety. As a substitute, researchers affirm the creation of cryptographic key utilizing the biometric features of both sender and receiver throughout the sessions of communication, thus bypassing key sharing through the insecure channel and at the very time without imperiling the power in safety. Nonetheless, the biometric-based cryptographic key formation contains few matters so as the secrecy of biometrics, distributing of biometric data among both communicating users, and creating the revocable key of irrevocable biometric. Aforementioned work discusses the above-mentioned concerns. Here a structure for reliable communication among two users using cancelable fingerprint based session key agreement protocol has been suggested. For this, communication a session key is created by both communicating parties at their end using their cancelable fingerprint biometrics. In this aforementioned method, each original biometric data is converted into a cancelable biometric data and the revocable key for session key agreement protocol is created from the cancelable fingerprint of the communicating parties. For better performance and security purposes, all the actions of this protocol are based on elliptic curve cryptography. Proposed protocol precludes undesired third-parties from requiring a key selection on this agreeing parties. Based on the experimental evaluation across four datasets of FVC2002, the proposed structure is privacy-preserving and is excellently fitting for various real-time biometric-based applicability.
引用
收藏
页码:1023 / 1042
页数:20
相关论文
共 50 条
  • [31] AN EFFICIENT AND SECURE THREE-PASS AUTHENTICATED KEY AGREEMENT ELLIPTIC CURVE BASED PROTOCOL
    Mohammad, Zeyad
    Hsu, Chien-Lung
    Chen, Yaw-Chung
    Lo, Chi-Chun
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1273 - 1284
  • [32] A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography
    Dheerendra Mishra
    Ashok Kumar Das
    Sourav Mukhopadhyay
    Mohammad Wazid
    Wireless Personal Communications, 2016, 91 : 1361 - 1391
  • [33] A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography
    Mishra, Dheerendra
    Das, Ashok Kumar
    Mukhopadhyay, Sourav
    Wazid, Mohammad
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1361 - 1391
  • [34] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    R. Arshad
    N. Ikram
    Multimedia Tools and Applications, 2013, 66 : 165 - 178
  • [35] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    Arshad, R.
    Ikram, N.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 165 - 178
  • [36] A Biometric Authenticated Key Agreement Protocol for Secure Token
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (08): : 2311 - 2315
  • [37] Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography
    Nimbhorkar, Sonali
    Malik, Latesh
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 824 - 830
  • [38] An authenticated key exchange protocol in elliptic curve cryptography
    Reddy, P. Vasudeva
    Padmavathamma, M.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (05): : 697 - 705
  • [39] Efficient Region -Based Group Key Agreement Protocol for Ad Hoc Networks using Elliptic Curve Cryptography
    Kumar, K.
    Sumathy, V.
    Begum, J. Nafeesa
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1052 - +
  • [40] Design flaws of “an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography”
    Saru Kumari
    Multimedia Tools and Applications, 2017, 76 : 13581 - 13583