A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification

  • Liang Li
  • Jie Tian
  • Xin Yang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3917)


Computer networks have evolved from close local networks to open interconnected networks and the operations from data communication to online transaction. As such, identity authentication is indispensable in today’s computing platform. Current identity authentication techniques primarily focus on Public Key Infrastructure (PKI) or Identity Based Encryption (IBE). However, these techniques authenticate users’ identity relying on tokens or keys and one or many trustworthy third-party(s) that require databases running online, with multiple points of vulnerability and low efficiency.


Homeland Security Fingerprint Image Feature Code Public Parameter Identity Authentication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Chen, H., Wang, F.-Y.: Artificial Intelligence for Homeland Security. IEEE Intelligent Systems 20(5), 12–16 (2005)CrossRefGoogle Scholar
  2. 2.
    Yao, Y.Y., Wang, F.-Y., Wang, J., Zeng, D.: Rule + Exception Strategies for Security Information Analysis. IEEE Intelligent Systems 20(5), 52–57 (2005)CrossRefGoogle Scholar
  3. 3.
    Chen, H., Wang, F.-Y., Zeng, D.: Intelligence and Security informatics for Homeland Security: Information, Communication and Transportation. IEEE Trans. Intelligent Transportation Systems 5(4), 329–341 (2004)CrossRefGoogle Scholar
  4. 4.
    Sahai, A., Waters, B.: Fuzzy Identity-BasedEncryption. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. In: Proceedings of the IEEE, Special. Issue on Enabling Security Technologies for Digital Rights Management, June 2004, vol. 92(6) (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Liang Li
    • 1
  • Jie Tian
    • 1
  • Xin Yang
    • 1
  1. 1.Institute of Automation, Chinese Academy of Sciences, Graduate School of the Chinese Academy of ScienceBeijingChina

Personalised recommendations