A PRIVACY-PRESERVING AUTHENTICATION SCHEME USING BIOMETRICS FOR PERVASIVE COMPUTING ENVIRONMENTS

来源 :Journal of Electronics(China) | 被引量 : 0次 | 上传用户:ccscbr66
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other in advance,they should mutually authenticate each other.The service provider prefers to authenticate the user based on his identity while the user tends to stay anonymous.Privacy and security are two important but seemingly contradictory objectives.As a result,a user prefers not to expose any sensitive information to the service provider such as his physical location,ID and so on when being authenticated.In this paper,a highly flexible mutual authentication and key establishment protocol scheme based on biometric encryption and Diffie-Hellman key exchange to secure interactions between a user and a service provider is proposed.Not only can a user’s anonymous authentication be achieved,but also the public key cryptography operations can be reduced by adopting this scheme.Different access control policies for different services are enabled by using biometric encryption technique.The correctness of the proposed authentication and key establishment protocol is formally verified based on SVO logic. In pervasive computing environments, users can get services anytime and anywhere, but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other in advance, they should mutually authenticate each other. The service provider prefers to authenticate the user based on his identity while the user tends to stay anonymous.Privacy and security are two important but seemingly contradictory objectives.As a result, a user prefers not to expose any sensitive information to the service provider such as his physical location , ID and so on when being being authenticated.In this paper, a highly flexible mutual authentication and key establishment protocol scheme based on biometric encryption and Diffie-Hellman key exchange to secure interactions between a user and a service provider is proposed. Not only can a user’s anonymous authentication be achieved, but also the public key cryptography operations can be reduced by adopting this scheme.Di fferent access control policies for different services are enabled by using biometric encryption technique. The correctness of the proposed authentication and key establishment protocol is formally verified based on SVO logic.
其他文献
各区、县人民政府,市府直属各单位: 近年来,我市非出版单位编印的画册、书刊、名录和内部学习资料等非营利性出版物,种类繁多,这对宣传党和政府的各项方针政策,建设社会主义
一张难看的面孔背后,或许隐藏着一颗敏锐的心?多年来,相貌与智商的关系,始终是科学研究的一个课题。起初,科研人员想要知道,能否通过某人的相貌读出其智商。1918年,俄亥俄州
有人说:’96书市无主流;有人说:’96书市无热点。平平淡淡的书市导致了不同的评说,丽对读书人来说,读书和对书的选择绵绵不绝地延续下去。那么,1996年,我们到底读到了哪些可
各区、县级市人民政府、市府直属各单位:《广州政报》是广州市人民政府唯一的一份权威性政务性月刊。由广州市人民政府主办、办公厅主编。该刊宗旨是及时准确宣传市政府制订
2007年诺贝尔经济学奖获得者埃里克·马斯金在弟子眼里是一位超级严谨和严格的导师。马斯金同另外两位美国经济学家获的诺贝尔经济学奖是因为他们为“机制设计理论” Erik M
一是把学习政报与贯彻执行党的方针政策结合起来,充分发挥政报传达政令的作用。我们把政报宣传到基层干部中,解决了他们看文件难的问题,各级干部在工作实践中学习政报,运用
1996年5月19日,《湖北政报》召开了第二次编委会,省政府办公厅副主任、《湖北政报》副主编游先高受主编张维先委托主持了会议。会议总结了第一次编委会议以来的政报工作,并
品德与生活注重为学生创设游戏化情境,使学生在喜欢的游戏性活动中自主学习、自主探究,丰富生活知识和体验,形成良好的道德行为规范。 Morality and Life Focus on creating
在移动互联网时代,要拥抱变化,并说服别人拥抱变化。现在不是缺乏选择,而是选择太多,在资源有限的情况下,要选对上什么船,这可能比你的执行力更重要,而且必须快速采取行动,一
9月15日,荆州行署罗贤才秘书长主持召开了荆州地区县(市)办公室主任会议,布置研究1994年政报宣传发行工作。本刊记者应邀参加了会议。罗贤才秘书长说:《湖北政报》是省人民