期刊文献+

一种基于在线身份认证方案的攻击方法设计

An Attack Method Design for Online Identity Authentication Scheme
下载PDF
导出
摘要 随着使用生物特征进行身份认证的应用越来越广泛,生物特征的隐私保护也越来越受到人们关注。一种在线指纹认证方案即e-Finga方案,可以提供安全且高效的在线指纹认证服务。但是该方案存在泄露用户指纹特征的风险。本文针对该身份认证方案设计了一种临时指纹攻击方法,并通过实验证明该攻击方法可以获取到用户的指纹特征。 With the more and more extensive application of identity authentication using biometrics, the privacy protection of biometrics has attracted more and more attention. An online fingerprint authentication scheme, e-finga scheme, can provide safe and efficient online fingerprint authentication services. However, the scheme has the risk of disclosing the user’s fingerprint characteristics. This paper designs a temporary fingerprint attack method for the identity authentication scheme, and experiments show that the attack method can obtain the user’s fingerprint characteristics.
作者 刘尧 LIU Yao(Institute of Cryptology Engineering,Engineering University of PAP,Xi'an Shaanxi 710086,China)
出处 《信息与电脑》 2021年第19期111-113,共3页 Information & Computer
基金 国家自然科学基金项目(项目编号:U1636114)。
关键词 同态密码 双线性映射 攻击方法 隐私保护 homomorphic encryption bilinear mapping attack method privacy protection
  • 相关文献

参考文献4

二级参考文献33

  • 1LAN MAN St&nd&rds Committee of the IEEE Computer Society, Wireless LAN Medium Access Control (MAC) &nd Physic&l L&yer (PHY) Specific&tions, ANS/IEEE St&ndard 802.1], June 2005.
  • 2J.R.Walker. Unsafe at any key size; An analysis of the WEP encapsulation, Technical Report 03628E, IEEE 802.11 Committee, 2000.
  • 3J. H&ssell. P, ADIUS, 0 ' Peilly , 2002 .
  • 4I.G. Kim and J .Y .Choi. Formal verification of PAP and EAPMD5 protocols in wireless networks: FDR model checking Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004),Fukuoka, Japan, pp.264-269, March 2004,.
  • 5G .Lowe Casper : a compiler for the analysis of secur)ty protocols, The 10th IEEE Computer Security Foundations Workshop, pp.18-30, 1997.
  • 6P.Y.A. Ryan and S.A. Schneider, Modeling &nd &nalysis of security protocols: the CSP appro&ch. Addison-Wesley, 2001.
  • 7E.J Yoon, K.Y Yoo, in Wireless Net-works, on PP Secure Password Authentication Protoco The 2006 International Conference Next Gener&tion Web Services Pr&ctices NWeSP'06) 49-154, 2006.
  • 8Y.-C. Lee, Y.-C. Hsieh, P.--S. You, A New Improved Secure P&ssword Authentic&tion Protocol to P, esist Guessing Att&cK in Wireless NetworKs. 7th WSEAS Int.Conf. on APPLIED COMPUTER&APPLIED COMPUTATIONAL SCIENCE (ACACOS 108), H&ngzhou, Chin&, April 6-8, 2008 160-163.
  • 9中国密码学会.中国密码学发展报告2008[M].北京:电子工业出版社,2008.
  • 10Lamport L.Password authentication with insecure communication[J].Communication of ACM,1981,24(11):770-772.

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部