Secure Biometric Authentication Scheme Based on Chaotic Map

Author(s):  
Jiahao Liang ◽  
Lin You
Author(s):  
Liping Zhang ◽  
Yue Zhu ◽  
Wei Ren ◽  
Yinghan Wang ◽  
Kim-Kwang Raymond Choo ◽  
...  

2016 ◽  
Vol 40 (11) ◽  
Author(s):  
Shehzad Ashraf Chaudhry ◽  
Muhammad Tawab Khan ◽  
Muhammad Khurram Khan ◽  
Taeshik Shon

2019 ◽  
Vol 10 (2) ◽  
pp. 61-74
Author(s):  
D S Bogdanov ◽  
Vladimir Olegovich Mironkin

Исследован проект стандарта защиты нейросетевых биометрических контейнеров, использующего криптографические алгоритмы. Показана несостоятельность рассмотренного совмещения парольной и нейросетевой биометрической систем защиты информации. Предложен алгоритм, позволяющий восстанавливать ключевую информацию, а также служебную информацию, определяющую процесс функционирования нейронной сети. Получен ряд численных характеристик алгоритма.


2016 ◽  
Vol 2016 ◽  
pp. 1-10
Author(s):  
Yousheng Zhou ◽  
Junfeng Zhou ◽  
Feng Wang ◽  
Feng Guo

A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in which the real identity of the user is encrypted with a shared key between the user and the trusted server. Only the trusted server can determine the real identity of a user during the authentication, and any other entities including other users of the system get nothing about the user’s real identity. In addition, the shared key of encryption can be easily computed by the user and trusted server using the Chebyshev map without additional burdensome key management. Once the partnered two users are authenticated by the trusted server, they can easily proceed with the agreement of the session key. Formal security analysis demonstrates that the proposed scheme is secure under the random oracle model.


Sign in / Sign up

Export Citation Format

Share Document