Abstract
Computer networks have evolved from close local networks to open interconnected networks and the operations from data communication to online transaction. As such, identity authentication is indispensable in today’s computing platform. Current identity authentication techniques primarily focus on Public Key Infrastructure (PKI) or Identity Based Encryption (IBE). However, these techniques authenticate users’ identity relying on tokens or keys and one or many trustworthy third-party(s) that require databases running online, with multiple points of vulnerability and low efficiency.
Similar content being viewed by others
References
Chen, H., Wang, F.-Y.: Artificial Intelligence for Homeland Security. IEEE Intelligent Systems 20(5), 12–16 (2005)
Yao, Y.Y., Wang, F.-Y., Wang, J., Zeng, D.: Rule + Exception Strategies for Security Information Analysis. IEEE Intelligent Systems 20(5), 52–57 (2005)
Chen, H., Wang, F.-Y., Zeng, D.: Intelligence and Security informatics for Homeland Security: Information, Communication and Transportation. IEEE Trans. Intelligent Transportation Systems 5(4), 329–341 (2004)
Sahai, A., Waters, B.: Fuzzy Identity-BasedEncryption. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. In: Proceedings of the IEEE, Special. Issue on Enabling Security Technologies for Digital Rights Management, June 2004, vol. 92(6) (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, L., Tian, J., Yang, X. (2006). A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification. In: Chen, H., Wang, FY., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds) Intelligence and Security Informatics. WISI 2006. Lecture Notes in Computer Science, vol 3917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734628_29
Download citation
DOI: https://doi.org/10.1007/11734628_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33361-6
Online ISBN: 978-3-540-33362-3
eBook Packages: Computer ScienceComputer Science (R0)