Chris J. Mitchell and Qiang Tang (2005) Security of the Lin-Lai smart card based user authentication scheme.
Full text access: Open
The remote user authentication scheme of Lin and Lai, that uses a smart card and a fingerprint measurement, is reviewed and shown to possess significant security issues.
This is a Published version This version's date is: 27/01/2005 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/e271a679-5b5b-4629-fa7c-c51014f072b0/1/
Deposited by () on 13-Jul-2010 in Royal Holloway Research Online.Last modified on 13-Dec-2010
[1] T. ElGamal. A public key cryptosystem and a signature scheme basedon discrete logarithms. IEEE Transactions on Information Theory, IT-31:469–472, 1985.
[2] J. K. Lee, S. R. Ryu, and K. Y. Yoo. Fingerprint-based remote userauthentication scheme using smart cards. Electronics Letters, 38:554–555, 2002.
[3] C.-H. Lin and Y.-Y. Lai. A flexible biometrics remote user authenticationscheme. Computer Standards & Interfaces, 27:19–23, 2004.
[4] T. Matsumoto. Gummy and conductive silicone rubber fingers. InY. Zheng, editor, Advances in Cryptology — ASIACRYPT 2002, 8th InternationalConference on the Theory and Application of Cryptology andInformation Security, Queenstown, New Zealand, December 1-5, 2002,Proceedings, number 2501 in Lecture Notes in Computer Science, pages574–575. Springer-Verlag, Berlin, 2002.
[5] T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. Impact ofartificial “gummy fingers” on fingerprint systems. In R. L. van Renesse,editor, Optical Security and Counterfeit Deterrence Techniques IV, Proceedingsof SPIE Vol. 4677, pages 275–289. SPIE: The International Societyfor Optical Engineering, 2002.
[6] L. Rila and C. J. Mitchell. Security analysis of smartcard to card readercommunications for biometric cardholder authentication. In Proceedingsof CARDIS ’02, 5th Smart Card Research and Advanced Application Conference,San Jose, California, November 2002, pages 19–28. USENIX Association,Berkeley, CA, 2002.
[7] L. Rila and C. J. Mitchell. Security protocols for biometrics-based cardholder authentication in smartcards. In J. Zhou, M. Yung, and Y. Han,editors, Applied Cryptography and Network Security - First InternationalConference, ACNS 2003 — Kunming, China, October 16-19 2003 —Proceedings, volume 2846 of Lecture Notes in Computer Science, pages254–264. Springer-Verlag, Berlin, 2003.