Smart card based AKE protocol using biometric information in pervasive computing environments

Wansuck Yi, Seungjoo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Smart card based authenticated key exchange allows a user with smartcards and the server to authenticate each other and to agree on a session key which can be used for confidentiality or data integrity. In the paper, we propose a two-round smart card based AKE (Authenticated Key Exchange) protocol using biometric information which provides mutual authentication but only requires symmetric cryptographic operations. This paper proposes a new protocol which is best suitable in pervasive computing environments thus providing efficiency in number of rounds, forward secrecy and security against known-key attack.

Original languageEnglish
Title of host publicationComputational Science and Its Applications - ICCSA 2009 - International Conference, Proceedings
Pages182-190
Number of pages9
EditionPART 2
DOIs
Publication statusPublished - 2009
Externally publishedYes
EventInternational Conference on Computational Science and Its Applications, ICCSA 2009 - Seoul, Korea, Republic of
Duration: 2009 Jun 292009 Jul 2

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 2
Volume5593 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherInternational Conference on Computational Science and Its Applications, ICCSA 2009
Country/TerritoryKorea, Republic of
CitySeoul
Period09/6/2909/7/2

Keywords

  • Authentication
  • Biometrics
  • Forward secrecy
  • Key exchange
  • Known-key secrecy
  • Pervasive computing
  • Smart card

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Smart card based AKE protocol using biometric information in pervasive computing environments'. Together they form a unique fingerprint.

Cite this