{"title":"Identity Authentication Based on Fuzzy Vault and Digital Certificate","authors":"Fen Li, QUAN LIU, Liaojun Pang, Qingqi Pei","doi":"10.1109/CIS.2010.102","DOIUrl":null,"url":null,"abstract":"Identity authentication is an important component of network security to guarantee the security of the information and service on open network. In this paper, we propose a secure “strong two-factor identity authentication” which stores digital certificate in smart card, and then protects the PIN of smart card with fuzzy fingerprint vault. Only the legal user can release the securely stored PIN to open the smart card and acquire the stored digital certificate with its private key by inputting his/her fingerprint. This scheme further perfects the safe authentication of PKI, and can be applied in the identity authentication of high-end user or the user with special safety requirement.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Computational Intelligence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2010.102","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Identity authentication is an important component of network security to guarantee the security of the information and service on open network. In this paper, we propose a secure “strong two-factor identity authentication” which stores digital certificate in smart card, and then protects the PIN of smart card with fuzzy fingerprint vault. Only the legal user can release the securely stored PIN to open the smart card and acquire the stored digital certificate with its private key by inputting his/her fingerprint. This scheme further perfects the safe authentication of PKI, and can be applied in the identity authentication of high-end user or the user with special safety requirement.