期刊文献+

结合指纹信息的PKI认证系统 被引量:6

PKI Authentication System Combining with Fingerprint
下载PDF
导出
摘要 把指纹信息作为安全因子嵌入用户的签字私钥信息中,使用秘密分存机制把用户的私钥信息分为DSS私钥和指纹信息两个部分,使私钥信息与用户的信息结合起来,进一步提高了私钥的安全性。该文提出的认证系统采用指纹和智能卡双重认证技术,安全性高,认证过程不需要传递用户指纹信息,保护了用户的隐私。 Fingerprint is added into user's private key as a security parameter, and user's secret key is separated into two parts: DSS key and fingerprint by secret splitting mechanism, which makes secret key combine with user's information and further increases the security of secret key. In this authentication system, the diplex authentication technologies, fingerprint and smart card, are adopted, and user's fingerprint need not be transmitted in the authentication process, which protects user's privacy.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第9期59-60,140,共3页 Computer Engineering
基金 国家"863"信息安全主题课题资助项目"铁道部客票网络安全管理系统"(2002AA145021)
关键词 指纹识别 智能卡 认证 PKI 网络安全 DSS Fingerprint identification Smart card Authentication PKI Network security DSS
  • 相关文献

参考文献9

  • 1朱建新,杨小虎.基于指纹的网络身份认证[J].计算机应用研究,2001,18(12):14-17. 被引量:38
  • 2邹华,刘强,郭成城,晏蒲柳,夏德麟.结合指纹识别和智能卡的安全电子商务系统[J].计算机工程,2003,29(1):100-101. 被引量:7
  • 3任传伦,李远征,杨义先.一种安全的指纹身份认证系统的设计[J].计算机工程与应用,2003,39(17):33-34. 被引量:3
  • 4于洋,王戟,陈晓桦.PKI的使用脆弱性及对策[J].计算机工程与科学,2003,25(2):27-30. 被引量:14
  • 5Sanchez-Reillo R.Security Information and Operations in a Smart Card Through Biometrics.IEEE Aerospace and Electronic Systems Magazine,2001,16:3-6
  • 6Sanchez-Reillo R,Sanchez-Avila C.Fingerprint Verification Using Smart Cards for Access Control Systems [J].IEEE AESS Systems Magazine,2002: 12-15
  • 7Lee J K,Ryu S R,Yoo K Y.Fingerprint-based Remote User Authentication Scheme Using Smart Cards [J].Electronics Letters,2002,38(12)554-555
  • 8Jain A,Hong L,Pankanti S,et al.An Identity Authentication System Using Fingerprints [J].Proceedings of the IEEE,1997,85(9): 1365-1388
  • 9Haghez G,Koeune F,Quisquater J.Biometrics,Access Control,Smart cards: a Not so Simple Combination[C].In: Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000),Bristol,United Kingdom,Kluwer Academic Publishers,2000: 273-288

二级参考文献25

  • 1Paul DuBois.MySQL网络数据库指南[M].北京:机械工业出版社,2000..
  • 2Meriko Kaeo.网络安全性设计[M].北京:人民邮电出版社,2000..
  • 3[1]Ellison C, Schneier B. Ten Risk of PKI: What You're not Being Told About Public Key Infrastructure[J]. Computer Security Journal, 2000, 16(1):i-7.
  • 4[2]Young A, Yung M. The Dark Side of Blackbox Cryptography or Should We Trust Capstone? [ A]. Advances in Cryptology--Cryp-to'96 Proc[C]. Springer-Verlag, 1996.
  • 5[3]Fox B, LaMacchia B. Certificate Revocation: Mechanics and Meaning[A]. Proc Financial Cryptography' 98[C]. 1998. 158-164.
  • 6[4]McDaniel P, Rubin A. A Response to "Can We Eliminate Certificate Revocation Lists.? "[ A ]. Proc Financial Cryptography 2000[C]. 2000.245 - 258.
  • 7[5]Reiter M K, Stubblebine S G. Authentication Metric Analysis and Design[J]. ACM Trans on Information and System Security, 1999,2(2):138- 158.
  • 8[6]Lampson B, Abadum M, Burrows M, et al. Authentication in Distributed Systems: Theory and Practice[J]. ACM Trans on Computer Systems, 1992,10(4): 265 - 310.
  • 9[7]Millen K, Wright. Reasoning About Trust and Insurance in a Public Key Infrastructure [A]. IEEE Computer Security Foundations Workshop(CSFW-13) [ C]. 2000.
  • 10N HALLER.The S/KEY one-time password system[S].RFC 1760, 1995-11.

共引文献57

同被引文献34

引证文献6

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部