{"title":"Improvement of Digest Based Authentication Scheme for Biometric Verification","authors":"F. S. Babamir, M. Kirci","doi":"10.1109/ISCISC48546.2019.8985143","DOIUrl":null,"url":null,"abstract":"Normally, authenticating a system in an untrusted environment is performed through mechanisms such as identification card, password checking and etc. However, by the development of technology, cracking such systems through forging password or stealing identification card may be done leading to the lack of security and hence privacy. This is why biometric based authentication systems are appropriate offer to provide security of clients. Through such systems, clients are verified and permitted to login to the system according to their physical or behavioral traits. Biometric systems offer several advantages over traditional authentication methods. Moreover, these systems, protects the privacy of clients, confidentiality and integrity of critical information for emerging technology such as smartphones and other appliances. In this paper, we improved our previous biometric authentication system and through some practical scenarios, we considered different attacks from client, server, and network sides to intrude into the privacy. We mathematically proved that our scheme is indistinguishable and prevents the attacker to threat legitimate individuals' information and privacy. Finally, we showed our computation and memory efficiency compared with related studies.","PeriodicalId":128407,"journal":{"name":"2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCISC48546.2019.8985143","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Normally, authenticating a system in an untrusted environment is performed through mechanisms such as identification card, password checking and etc. However, by the development of technology, cracking such systems through forging password or stealing identification card may be done leading to the lack of security and hence privacy. This is why biometric based authentication systems are appropriate offer to provide security of clients. Through such systems, clients are verified and permitted to login to the system according to their physical or behavioral traits. Biometric systems offer several advantages over traditional authentication methods. Moreover, these systems, protects the privacy of clients, confidentiality and integrity of critical information for emerging technology such as smartphones and other appliances. In this paper, we improved our previous biometric authentication system and through some practical scenarios, we considered different attacks from client, server, and network sides to intrude into the privacy. We mathematically proved that our scheme is indistinguishable and prevents the attacker to threat legitimate individuals' information and privacy. Finally, we showed our computation and memory efficiency compared with related studies.