z-logo
open-access-imgOpen Access
Remote three‐factor authentication scheme based on Fuzzy extractors
Author(s) -
Zhang Min,
Zhang Jiashu,
Zhang Ying
Publication year - 2014
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.1016
Subject(s) - computer science , factor (programming language) , scheme (mathematics) , multi factor authentication , authentication (law) , fuzzy logic , computer security , artificial intelligence , authentication protocol , data mining , programming language , mathematics , mathematical analysis
In order to provide high‐security remote authentication, the three‐factor authentication scheme combining biometric with smart card and password has been proposed. With a careful review of the recently proposed Lee–Hsu's scheme, this paper points out some design flaws in it. In order to withstand them, a new scheme based on Fuzzy extractors is proposed. With a detail analysis, this paper demonstrates that the proposed scheme is more practical and reasonable. It also has higher security and deals with biometric more appropriately in spite of higher computation cost at client than Lee–Hsu's scheme. Furthermore, an access control method has been introduced in it for the purpose of making different users enjoy different access privileges with regard to the data. What is more, the proposed scheme can also achieve key agreement. Copyright © 2014 John Wiley & Sons, Ltd.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here