Skip to main content
Log in

User Authentication Algorithm Guaranteeing Reusability of Biometric Data in BioPKI System

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The PKI system performs mutual authentication, using the private and public keys published by the Certificate Authority. In this system, private keys are protected with a password. Therefore, it has password leak vulnerability. To improve conventional password-based authentication vulnerability, there have been a lot of studies on biometric data-based authentication technologies these days. The BioPKI system in which biometric data authentication technology is applied to the conventional PKI system enables user authentication and digital signature, using the biometric data-based authenticated certificate. However, the biggest problem of this biometric data authentication technology is that once exposed to an attacker, it wouldn’t be valid anymore. And concatenates the user’s fingerprint information and the fingerprint sequence number to generate a reusable Bio FP . With the proposed method, even if the same user use the same fingerprint information it can be generated every time the other biometric data can ensure the re-usability of the end user’s fingerprint information. Therefore, this study attempted to propose a way a way to create reusable biometric data and apply it to the BioPKI system. When the proposed method was applied to the BioPKI system, attack complexity increased by approximately 1.8 × 1012. Therefore, it can make a contribution to improving the reuse of a user’s biometric data and security in the BioPKI system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Yun, S. (2016). The biometric authentication based dynamic group signature scheme. Journal of the Korea Convergence Society, 6(7), 49–55.

    Article  Google Scholar 

  2. Lee, K.-J., & Lee, K.-H. (2013). Authentication scheme using biometrics in intelligent vehicle network. Journal of the Korea Convergence Society, 4(3), 15–20.

    Article  Google Scholar 

  3. Song, C.-G., & Lee, K.-H. (2012). Design of authentication system using biometrics for U-healthcare environment in M2M. Journal of the Korea Convergence Society, 3(2), 13–17.

    Google Scholar 

  4. Moon, H.-J., Lee, M.-H., & Jeong, K.-H. (2015). Authentication performance optimization for smart-phone based multimodal biometrics. Journal of digital Convergence, 13(6), 151–156.

    Article  Google Scholar 

  5. Lee, S.-J., Cho, G.-Y., Song, S.-H., Jang, J.-S., Lee, K.-I., & Lee, T.-R. (2015). Solution for efficient vital data transmission and storing in m-Health environment. Journal of digital Convergence, 13(5), 227–235.

    Article  Google Scholar 

  6. Yun, S. H., Lim, H., Jeong, Y.-S., Jung, S. Y., & Chang, J.-K. (2011). The biometric based convertible undeniable multi-signature scheme to ensure multi-author copyrights and profits. Wireless Personal Communications, 60(3), 405–418.

    Article  Google Scholar 

  7. Kang, S.-K., Chung, K.-Y., Ryu, J.-K., Rim, K.-W., & Lee, J.-H. (2013). Bio-interactive healthcare service system using lifelog based context computing. Wireless Personal Communications, 73(2), 341–351.

    Article  Google Scholar 

  8. Razzak, M. I., Khan, M. K., Alghathbar, K., & Park, J. H. (2011). Energy efficient distributed face recognition in wireless sensor network. Wireless Personal Communications, 60(3), 571–582.

    Article  Google Scholar 

  9. Yoo, J.-H. (2013). Biometric technology. Korea information processing society review, 20(3), 4–13.

    Google Scholar 

  10. Wen, F., Susilo, W., & Yang, G. (2015). Analysis and improvement on a biometric-based remote user authentication scheme using smart cards. Wireless Personal Communications, 80(4), 1747–1760.

    Article  Google Scholar 

  11. Lee, H.-W., Yun, S.-H., Moon, K.-Y., & Yun-Su, C. (2007). Digital signature and key generation using biometric information. Korea Contents Association, 5(1), 32–44.

    Google Scholar 

  12. Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612–613.

    Article  MathSciNet  MATH  Google Scholar 

  13. Fingerprint Verification Competition, Database-DB1, http://bias.csr.unibo.it/fvc2000/db1.asp.

  14. The Home Computer Security Centre. Password Recovery Speeds, http://www.lockdown.co.uk.

Download references

Acknowledgments

This work was supported by the Far East University Research Grant (FEU2015S02).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Han-Jin Cho.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chae, CJ., Cho, HJ. User Authentication Algorithm Guaranteeing Reusability of Biometric Data in BioPKI System. Wireless Pers Commun 93, 67–79 (2017). https://doi.org/10.1007/s11277-016-3595-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3595-z

Keywords

Navigation