Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol

Zhang, Liping, Tang, Shanyu ORCID: and Zhu, Shaohui (2017) Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol. Wireless Networks, 23 (6). pp. 1901-1916. ISSN 1022-0038

[thumbnail of (R3)Privacy-Preserving Authenticated Key Agreement Scheme.pdf] PDF
(R3)Privacy-Preserving Authenticated Key Agreement Scheme.pdf - Accepted Version
Restricted to Repository staff only

Download (322kB)


A secure key agreement scheme plays a major role in protecting communications between the users using voice over internet protocol over a public network like the internet. In this paper we present a strong security authenticated key agreement scheme for session initiation protocol (SIP) by using biometrics, passwords and smart cards. The proposed scheme realizes biometric data protection through key agreement process meanwhile achieving the verification of the biometric value on the SIP server side which is very important in designing a practical authenticated key agreement for SIP. The main merits of our proposed scheme are: (1) the SIP server does not need to maintain any password or verification table; (2) the scheme can provide user identity protection—the user’s real identity is protected by a secure symmetric encryption algorithm and the elliptic curve discrete logarithm problem, and it is transmitted in code; (3) the scheme can preserve the privacy of the user’s biometric data while the biometric matching algorithm is performed at the SIP server side, even if the server does not know the biometric data in the authentication process. Performance and security analysis shows that our proposed scheme increases efficiency significantly in comparison with other related schemes.

Item Type: Article
Identifier: 10.1007/s11276-016-1267-2
Keywords: Biometrics; Privacy protection; User anonymity; Session initiation protocol; VoIP
Subjects: Computing > Information security > Cyber security
Computing > Information security
Depositing User: Shanyu Tang
Date Deposited: 28 Jul 2017 17:43
Last Modified: 06 Feb 2024 15:53

Actions (login required)

View Item View Item