Advanced SearchSearch Tips
The Biometric Authentication based Dynamic Group Signature Scheme
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
The Biometric Authentication based Dynamic Group Signature Scheme
Yun, Sunghyun;
  PDF(new window)
In a delegate authentication, a user can lend his/her own authentication data to the third parties to let them be authenticated instead of himself/herself. The user authentication schemes based on the memory of unique data such as password, are vulnerable to this type of attack. Biometric authentication could minimize the risk of delegate authentication since it uses the biometric data unique by each person. Group authentication scheme is used to prove that each group member belongs to the corresponding group. For applications such as an electronic voting or a mobile meeting where the number of group members is changing dynamically, a new group authentication method is needed to reflect the status of group in real time. In this paper, we propose biometric authentication based dynamic group signature scheme. The proposed scheme is composed of biometric key generation, group public key creation, group signature generation, group signature verification and member update protocols. The proposed member update protocol is secure against colluding attacks of existing members and could reflect group status in real time.
Signature Delegation;Biometric Authentication;Group Authentication;Mobile Business Meeting;Electronic Voting;
 Cited by
눈동자를 이용한 사용자 인증기법,이재욱;강보선;이근호;

디지털융복합연구, 2016. vol.14. 9, pp.325-329 crossref(new window)
User Authentication Algorithm Guaranteeing Reusability of Biometric Data in BioPKI System, Wireless Personal Communications, 2017, 93, 1, 67  crossref(new windwow)
A Scheme for User Authentication using Pupil, Journal of Digital Convergence, 2016, 14, 9, 325  crossref(new windwow)
M. Stamp, Information Security: Principles and Practice 2nd Edition, Wiley-Inerscience, 2011.

Tepandi, "Wireless PKI Security and Mobile Voting", IEEE Computer, Vol. 43, No. 6, pp. 54-60, 2010.

S. H. Yun, "The Biometric based Mobile ID and Its Application to Electronic Voting", KSII Transactions on Internet and Information Systems, Vol. 7, No. 1, pp. 166-183, 2013. crossref(new window)

P. Janbandhu, M. Siyal, "Novel biometric digital signatures for Internet-based applications", Information Management & Computer Security, Vol. 9, No. 5, pp. 205-212, 2001. crossref(new window)

N. K. Ratha, J. H. Connell, R. M. Bolle, "Enhancing security and privacy in biometric-based authentication systems", IBM Systems Journal, Vol. 40, No. 3, pp. 614-634, 2001. crossref(new window)

ITU-T X.1088, A Framework for biometric digital key generation, ITU-T, 2008.

Apple Support, Ues Touch ID on iPhone and iPad,

C. Vivaracho-Pascual, J. Pascual-Gaspar, "On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services", IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp. 1-10, 2011.

H. Li, K. Toh, L. Li, Advanced Topics in Biometrics, World Scientific, 2011.

L. Harn, "(t,n) Threshold Signature and Digital Multisignature", Workshop on Cryptography & Data Security, pp. 61-73, 1993.

S. H. Yun, "The USIM based Biometric Multi-Signature for Mobile Content Authentication", ICONI, pp. 137-141, 2011.

W. Diffie, M. Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644-654, 1976. crossref(new window)

D. M. Burton, Elementary Number Theory, McGraw-Hill, 2010.

T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, 1985. crossref(new window)

D. Chaum, "Undeniable Signatures", Advances in Cryptology, Proceedings of CRYPTO'89, Springer-Verlag, pp. 212-216, 1990.

D. R. Kim, "A Study on the OTP Generation Algorithm for User Authentication", Journal of Digital Convergence, Vol. 13, No. 1, pp. 283-288, 2015.

Y. J. Song, S. M. Gu, Y. C. Kim, "A Study on the Distributed Transcoding System using Secret Sharing Techniques", Journal of Digital Convergence, Vol. 12, No. 11, pp. 233-239, 2014.

S. H. Hong, "Vulnerability of Directory List and Countermeasures", Journal of Digital Convergence, Vol. 12, No. 10, pp. 259-264, 2014.

H. M. Choi, C. B. Jang, J. M. Kim, "Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM", Journal of Digital Convergence, Vol. 12, No. 10, pp. 299-308, 2014.

S. Y. Lee, S. S. Yeo, "Efficient Secret Sharing Data Management Scheme for Privacy Protection in Smart Grid Environment", Journal of Digital Convergence, Vol. 11, No. 12, pp. 311-318, 2013. crossref(new window)