Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards

  • Eun-Jun Yoon
  • Kee-Young Yoo
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3828)


Biometrics and smartcards have the potential to be a very useful combination of technology. Among the various biometrics technological advances in use today, fingerprint recognition seems to be particularly suitable for smartcard systems. In 2002, Lee-Ryu-Yoo proposed a fingerprint-based remote user authentication scheme using smartcards. This scheme, however, was found to be potentially vulnerable to some forgery attacks and is not easily repairable. The current paper presents an improved scheme that is more secure and efficient.


User authentication Smartcard Fingerprint verification 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Rila, L., Mitchell, C.J.: Security Protocols for Biometrics-based Cardholder Authentication in Smartcards. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 254–264. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24(11), 770–772 (1981)CrossRefMathSciNetGoogle Scholar
  3. 3.
    Hwang, M.S., Li, L.H.: A New Remote User Authentication Scheme using Smart Cards. IEEE Trans. on Consumer Electronics 46(1), 28–30 (2000)CrossRefGoogle Scholar
  4. 4.
    ElGamal, T.: A Public-key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory IT-31(4), 469–472 (1985)CrossRefMathSciNetGoogle Scholar
  5. 5.
    Lee, J.K., Ryu, S.R., Yoo, K.Y.: Fingerprint-based Remote User Authentication Scheme using Smart Cards. Electronics Letters 38(2), 554–555 (2002)CrossRefGoogle Scholar
  6. 6.
    Bae, I.G., Cho, B.H., Kim, J.S., Bae, J.H., Yoo, K.Y.: Online Fingerprint Verification System using Direct Minutia Extraction. In: 13th International Conference on Computer Applications in Industry and Engineering, Honolulu. Hawaii, pp. 120–123 (2000)Google Scholar
  7. 7.
    Ratha, N.K., Karu, K., Chen, S., Jain, A.K.: A Real-time Matching System for Large Fingerprint Databases. IEEE Transactions on Pattern Analysis and Machine Intelligence 18(8), 799–813 (1996)CrossRefGoogle Scholar
  8. 8.
    Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics Personal Identification in Networked Society, pp. 369–384. Kluwer Academic Publishing, Dordrecht (1999)Google Scholar
  9. 9.
    Chang, C.C., Lin, I.C.: Remarks on Fingerprint-Based Remote User Authentication Scheme Using Smart Cards. ACM SIGOPS Operating Systems Review 38(4), 91–96 (2004)CrossRefGoogle Scholar
  10. 10.
    Lin, C.H., Lai, Y.Y.: A Flexible Biometrics Remote User Authentication Scheme. Computer standards & Interfaces. 27(1), 19–23 (2004)CrossRefGoogle Scholar
  11. 11.
    Ku, W.C., Chang, S.T., Chiang, M.H.: Further Cryptanalysis of Fingerprint-based Remote User Authentication Scheme using Smartcards. Electronics Letters 41(5), 25–26 (2005)CrossRefGoogle Scholar
  12. 12.
    Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptograph. CRC Press, New York (1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Eun-Jun Yoon
    • 1
  • Kee-Young Yoo
    • 1
  1. 1.Department of Computer EngineeringKyungpook National UniversityDaeguSouth Korea

Personalised recommendations