Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 12 SI
Page No. 9365 - 9369

A Secure One-time Password Authentication Scheme Using Elliptic Curve Cryptography with Fingerprint Biometric

Authors : Dindayal Mahto and Dilip Kumar Yadav

References

Ballard, L., S. Kamara and M.K. Reiter, 2008. The Practical subtleties of biometric key generation. Proceedings of the 17th Symposium on USENIX Security, July 28-August 1, 2008, USENIX Association Berkeley, California, USA., pp: 61-74.

Barker, E., W. Barker, W. Burr, W. Polk and M. Smid, 2012. Recommendation for key management part 1: General (revision 3). Master Thesis, National Institute of Standards and Technology, Gaithersburg, Maryland, USA.

Chen, B. and V. Chandran, 2007. Biometric based cryptographic key generation from faces. Proceedings of the 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007), December 3-5, 2007, IEEE, Glenelg, Australia, ISBN:0-7695-3067-2, pp: 394-401.

Diffie, W. and M.E. Hellman, 1976. New directions in cryptography. IEEE Trans. Inform. Theory, 22: 644-654.
CrossRef  |  Direct Link  |  

Dodis, Y., L. Reyzin and A. Smith, 2004. Fuzzy Extractors: How to generate strong keys from biometrics and other noisy data. Adv. Cryptol. EUROCRYPT, 3027: 523-540.
CrossRef  |  

Feng, H. and C.C. Wah, 2002. Private key generation from on-line handwritten signatures. Inform. Manage. Comput. Secur., 10: 159-164.
CrossRef  |  Direct Link  |  

Ganesan, R., 2009. A secured hybrid architecture model for internet banking (E-banking). J. Internet Banking Commerce, 14: 1-17.
Direct Link  |  

Ganesan, S.P., 2010. An asymmetric authentication protocol for mobile devices using elliptic curve cryptography. Proceedings of the 2010 2nd International Conference on Advanced Computer Control (ICACC) Vol. 4, March 27-29, 2010, IEEE, Shenyang, China, ISBN:978-1-4244-5845-5, pp: 107-109.

Haller, N., 1995. The s/key one-time password system. Inf., 1: 1-12.
Direct Link  |  

Koblitz, N., 1987. Elliptic curve cryptosystems. Math. Comput., 48: 203-209.
Direct Link  |  

Mahto, D. and D.K. Yadav, 2013. Network security using ECC with biometric. Proceedings of the 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, January 11-12, 2013, Springer, Berlin, Germany, pp: 842-853.

Mahto, D. and D.K. Yadav, 2015. Enhancing security of one-time password using elliptic curve cryptography with finger-print biometric. Proceedings of the 2nd International Conference on Computing for Sustainable Global Development (INDIACom), March 11-13, 2015, IEEE, New Delhi, India, ISBN:978-9-3805-4415-1, pp: 1737-1742.

Mahto, D. and D.K. Yadav, 2015. Enhancing security of one-time password using elliptic curve cryptography with biometrics for E-commerce applications. Proceedings of the 2015 3rd International Conference on Computer, Communication, Control and Information Technology (C3IT), February 7-8, 2015, IEEE, Hooghly, India, ISBN:978-1-4799-4446-0, pp: 1-6.

Mahto, D. and D.K. Yadav, 2017. Secure online medical consultations using elliptic curve cryptography with iris biometric. Intl. J. Control Theory Appl., 10: 169-179.
Direct Link  |  

Mahto, D., D.A. Khan and D.K. Yadav, 2016. Security analysis of elliptic curve cryptography and RSA. Proceedings of the World Congress on Engineering Vol. 1, Proceedings of the World Congress on Engineering Vol. 1, June 29-July 1, 2016, WCE-Razi Publishing, London, England, UK., ISBN:978-988-19253-0-5, pp: 29-34.

Miller, V.S., 1985. Use of elliptic curves in cryptography. Proceedings of the Conference on Theory and Application of Cryptographic Techniques (CRYPTO’85), August 18-22, 1985, Springer, Berlin, Germany, pp: 417-426.

Mohammadi, S. and S. Abedi, 2008. ECC-based biometric signature: A new approach in electronic banking security. Proceedings of the 2008 International Symposium on Electronic Commerce and Security, August 3-5, 2008, IEEE, Guangzhou, China, ISBN:978-0-7695-3258-5, pp: 763-766.

Monrose, F., M.K. Reiter, Q. Li and S. Wetzel, 2001. Cryptographic key generation from voice. Proceedings of the IEEE Symposium on Security and Privacy (S&P 2001), May 14-16, 2001, IEEE, Oakland, California, USA., ISBN:0-7695-1046-9, pp: 202-213.

Ogiela, M.R. and L. Ogiela, 2011. Image based crypto-biometric key generation. Proceedings of the 3rd International Conference on Intelligent Networking and Collaborative Systems (INCoS), November 30-December 2, 2011, IEEE, Fukuoka, Japan, ISBN:978-1-4577-1908-0, pp: 673-678.

Rajagopalan, S.P. and Vidyaathulasiraman, 2007. A proposed theory of using finger print as the primary tool of biometrical user authentication in an OLTP system under heterogeneous environment. J. Eng. Applied Sciences, 2: 846-848.
CrossRef  |  Direct Link  |  

Rathgeb, C. and A. Uhl, 2010. Privacy preserving key generation for iris biometrics. Proceedings of the 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS 2010) Vol. 6109, May 31-June 2, 2010, Springer, Berlin, Germany, pp: 191-200.

Sanyasi, D.R. and A.K. Desai, 2016. Optimizing cipher text size for ASCII based cryptography using Matrices. Intl. J. Multi. Cryptology Inf. Secur., 5: 8-11.
Direct Link  |  

Shibata, Y., M. Mimura, K. Takahashi and M. Nishigaki, 2007. A study on biometric key generation from fingerprints: Fingerprint-key generation from stable feature value. Proceedings of the 26th Conference on Security and Management (SAM’7), July 25-28, 2007, Huntington Press Publishing, Las Vegas, Nevada, USA., pp: 45-51.

Teoh, A.B.J., D.C.L. Ngo and A. Goh, 2004. Personalised cryptographic key generation based on faceHashing. Comput. Security, 23: 606-614.
CrossRef  |  Direct Link  |  

Wang, Y. and K.N. Plataniotis, 2007. Fuzzy vault for face based cryptographic key generation. Proceedings of the Symposium on Biometrics, September 11-13, 2007, IEEE, Baltimore, Maryland, USA., ISBN:978-1-4244-1548-9, pp: 1-6.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved