Security of the Lin-Lai smart card based user authentication scheme

Chris J. Mitchell and Qiang Tang

(2005)

Chris J. Mitchell and Qiang Tang (2005) Security of the Lin-Lai smart card based user authentication scheme.

Our Full Text Deposits

Full text access: Open

Full Text - 101.48 KB

Links to Copies of this Item Held Elsewhere


Abstract

The remote user authentication scheme of Lin and Lai, that uses a smart card and a fingerprint measurement, is reviewed and shown to possess significant security issues.

Information about this Version

This is a Published version
This version's date is: 27/01/2005
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/e271a679-5b5b-4629-fa7c-c51014f072b0/1/

Item TypeMonograph (Technical Report)
TitleSecurity of the Lin-Lai smart card based user authentication scheme
AuthorsMitchell, Chris J.
Tang, Qiang
DepartmentsFaculty of Science\Mathematics

Deposited by () on 13-Jul-2010 in Royal Holloway Research Online.Last modified on 13-Dec-2010

Notes

References

[1] T. ElGamal. A public key cryptosystem and a signature scheme based
on discrete logarithms. IEEE Transactions on Information Theory, IT-
31:469–472, 1985.

[2] J. K. Lee, S. R. Ryu, and K. Y. Yoo. Fingerprint-based remote user
authentication scheme using smart cards. Electronics Letters, 38:554–
555, 2002.

[3] C.-H. Lin and Y.-Y. Lai. A flexible biometrics remote user authentication
scheme. Computer Standards & Interfaces, 27:19–23, 2004.

[4] T. Matsumoto. Gummy and conductive silicone rubber fingers. In
Y. Zheng, editor, Advances in Cryptology — ASIACRYPT 2002, 8th International
Conference on the Theory and Application of Cryptology and
Information Security, Queenstown, New Zealand, December 1-5, 2002,
Proceedings, number 2501 in Lecture Notes in Computer Science, pages
574–575. Springer-Verlag, Berlin, 2002.

[5] T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. Impact of
artificial “gummy fingers” on fingerprint systems. In R. L. van Renesse,
editor, Optical Security and Counterfeit Deterrence Techniques IV, Proceedings
of SPIE Vol. 4677, pages 275–289. SPIE: The International Society
for Optical Engineering, 2002.

[6] L. Rila and C. J. Mitchell. Security analysis of smartcard to card reader
communications for biometric cardholder authentication. In Proceedings
of CARDIS ’02, 5th Smart Card Research and Advanced Application Conference,
San Jose, California, November 2002, pages 19–28. USENIX Association,
Berkeley, CA, 2002.

[7] L. Rila and C. J. Mitchell. Security protocols for biometrics-based cardholder authentication in smartcards. In J. Zhou, M. Yung, and Y. Han,
editors, Applied Cryptography and Network Security - First International
Conference, ACNS 2003 — Kunming, China, October 16-19 2003 —
Proceedings, volume 2846 of Lecture Notes in Computer Science, pages
254–264. Springer-Verlag, Berlin, 2003.


Details