Abstract
The PKI system performs mutual authentication, using the private and public keys published by the Certificate Authority. In this system, private keys are protected with a password. Therefore, it has password leak vulnerability. To improve conventional password-based authentication vulnerability, there have been a lot of studies on biometric data-based authentication technologies these days. The BioPKI system in which biometric data authentication technology is applied to the conventional PKI system enables user authentication and digital signature, using the biometric data-based authenticated certificate. However, the biggest problem of this biometric data authentication technology is that once exposed to an attacker, it wouldn’t be valid anymore. And concatenates the user’s fingerprint information and the fingerprint sequence number to generate a reusable Bio FP . With the proposed method, even if the same user use the same fingerprint information it can be generated every time the other biometric data can ensure the re-usability of the end user’s fingerprint information. Therefore, this study attempted to propose a way a way to create reusable biometric data and apply it to the BioPKI system. When the proposed method was applied to the BioPKI system, attack complexity increased by approximately 1.8 × 1012. Therefore, it can make a contribution to improving the reuse of a user’s biometric data and security in the BioPKI system.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-016-3595-z/MediaObjects/11277_2016_3595_Fig1_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-016-3595-z/MediaObjects/11277_2016_3595_Fig2_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-016-3595-z/MediaObjects/11277_2016_3595_Fig3_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-016-3595-z/MediaObjects/11277_2016_3595_Fig4_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-016-3595-z/MediaObjects/11277_2016_3595_Fig5_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-016-3595-z/MediaObjects/11277_2016_3595_Fig6_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-016-3595-z/MediaObjects/11277_2016_3595_Fig7_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-016-3595-z/MediaObjects/11277_2016_3595_Fig8_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-016-3595-z/MediaObjects/11277_2016_3595_Fig9_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-016-3595-z/MediaObjects/11277_2016_3595_Fig10_HTML.gif)
Similar content being viewed by others
References
Yun, S. (2016). The biometric authentication based dynamic group signature scheme. Journal of the Korea Convergence Society, 6(7), 49–55.
Lee, K.-J., & Lee, K.-H. (2013). Authentication scheme using biometrics in intelligent vehicle network. Journal of the Korea Convergence Society, 4(3), 15–20.
Song, C.-G., & Lee, K.-H. (2012). Design of authentication system using biometrics for U-healthcare environment in M2M. Journal of the Korea Convergence Society, 3(2), 13–17.
Moon, H.-J., Lee, M.-H., & Jeong, K.-H. (2015). Authentication performance optimization for smart-phone based multimodal biometrics. Journal of digital Convergence, 13(6), 151–156.
Lee, S.-J., Cho, G.-Y., Song, S.-H., Jang, J.-S., Lee, K.-I., & Lee, T.-R. (2015). Solution for efficient vital data transmission and storing in m-Health environment. Journal of digital Convergence, 13(5), 227–235.
Yun, S. H., Lim, H., Jeong, Y.-S., Jung, S. Y., & Chang, J.-K. (2011). The biometric based convertible undeniable multi-signature scheme to ensure multi-author copyrights and profits. Wireless Personal Communications, 60(3), 405–418.
Kang, S.-K., Chung, K.-Y., Ryu, J.-K., Rim, K.-W., & Lee, J.-H. (2013). Bio-interactive healthcare service system using lifelog based context computing. Wireless Personal Communications, 73(2), 341–351.
Razzak, M. I., Khan, M. K., Alghathbar, K., & Park, J. H. (2011). Energy efficient distributed face recognition in wireless sensor network. Wireless Personal Communications, 60(3), 571–582.
Yoo, J.-H. (2013). Biometric technology. Korea information processing society review, 20(3), 4–13.
Wen, F., Susilo, W., & Yang, G. (2015). Analysis and improvement on a biometric-based remote user authentication scheme using smart cards. Wireless Personal Communications, 80(4), 1747–1760.
Lee, H.-W., Yun, S.-H., Moon, K.-Y., & Yun-Su, C. (2007). Digital signature and key generation using biometric information. Korea Contents Association, 5(1), 32–44.
Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612–613.
Fingerprint Verification Competition, Database-DB1, http://bias.csr.unibo.it/fvc2000/db1.asp.
The Home Computer Security Centre. Password Recovery Speeds, http://www.lockdown.co.uk.
Acknowledgments
This work was supported by the Far East University Research Grant (FEU2015S02).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chae, CJ., Cho, HJ. User Authentication Algorithm Guaranteeing Reusability of Biometric Data in BioPKI System. Wireless Pers Commun 93, 67–79 (2017). https://doi.org/10.1007/s11277-016-3595-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3595-z