• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction Technology


Younsung Choi, Dongho Won, Journal of Internet Computing and Services, Vol. 17, No. 3, pp. 1-10, Jun. 2016
10.7472/jksii.2016.17.3.01, Full Text:
Keywords: User authentication scheme, biometrics, fuzzy extraction

Abstract

Information and network technology become the rapid development, so various online services supplied by multimedia systems are provided through the Internet. Because of intrinsic open characteristic on Internet, network systems need to provide the data protection and the secure authentication. So various researchers including Das, An, and Li&Hwang proposed the biometric-based user authentication scheme but they has some security weakness. To solve their problem, Li et al. proposed new scheme using fuzzy extraction, but it is weak on off-line password attack, authentication without biometrics, denial-of-service and insider attack. So, we proposed security enhanced user authentication scheme with key agreement to address the security problem of authentication schemes.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Choi, Y. & Won, D. (2016). Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction Technology. Journal of Internet Computing and Services, 17(3), 1-10. DOI: 10.7472/jksii.2016.17.3.01.

[IEEE Style]
Y. Choi and D. Won, "Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction Technology," Journal of Internet Computing and Services, vol. 17, no. 3, pp. 1-10, 2016. DOI: 10.7472/jksii.2016.17.3.01.

[ACM Style]
Younsung Choi and Dongho Won. 2016. Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction Technology. Journal of Internet Computing and Services, 17, 3, (2016), 1-10. DOI: 10.7472/jksii.2016.17.3.01.