Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Aljeaid, D; Ma, X; Langensiepen, C (2014)
Publisher: IEEE
Languages: English
Types: Unknown
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Caloyannides, M., authentication framework and programs. IT professional, , pp. 16-21.
    • [2] Sahraoui, S., Gharaibeh, G. And Al-Jboori, A., 2006. E-Government in Saudi Arabia: Can it overcome its challenges, e-Government Workshop 2006.
    • [3] Evans, D. And Yen, D.C., 2005. E-government: An analysis for implementation: Framework for understanding cultural and social impact. Government Information Quarterly, 22(3), pp. 354-373.
    • [4] Voltage Security, 2006. Identity-Based Encryption and PKI Making Security Work. http://www.voltage.com/pdf/IBE_and_PKI.pdf edn. Voltage Security, Inc.
    • [5] Boneh, D. And Franklin, M., 2001. Identity-based encryption from the Weil pairing, Advances in Cryptology-CRYPTO 2001 2001, Springer, pp. 213-229.
    • [6] Gentry, C. and Silverberg, A., 2002. Hierarchical ID-based cryptography. Advances in Cryptology-ASIACRYPT 2002, , pp. 149- 155.
    • [7] Al-Riyami, S. and Paterson, K., 2003. Certificateless public key cryptography. Advances in Cryptology-ASIACRYPT 2003, , pp. 452- 473.
    • [8] Boneh, D. and Boyen, X., 2004. Efficient selective-ID secure identitybased encryption without random oracles, Advances in CryptologyEUROCRYPT 2004 2004, Springer, pp. 223-238.
    • [9] Duffy, A. And Dowling, T., 2004. An object oriented approach to an identity based encryption cryptosystem, Software Engineering and Applications 2004, ACTA Press.
    • [10] He, D., Chen, J. And Hu, J., 2012. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security.Information Fusion, 13(3), pp. 223-230.
    • [11] Li, C.T. And Hwang, M.S., 2010. An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), pp. 1-5.
    • [12] Shamir, A., 1985. Identity-based cryptosystems and signature schemes, Advances in cryptology 1985, Springer, pp. 47-53.
    • [13] Liao, J., Xiao, J., Qi, Y., Huang, P. and Rong, M., 2005. ID-based signature scheme without trusted PKG, Information Security and Cryptology 2005, Springer, pp. 53-62.
    • [14] Yuen, T., Susilo, W. and Mu, Y., 2010. How to construct identity-based signatures without the key escrow problem. Public Key Infrastructures, Services and Applications, , pp. 286-301.
    • [15] Vacca, J.R., 2007. Biometric technologies and verification systems. Oxford: Butterworth-Heinemann.
    • [16] Vielhauer, C., 2005. Biometric user authentication for IT security: from fundamentals to handwriting. New York ; London: Springer.
    • [17] Islam, S.H. and Biswas, G., 2012. An improved ID-based client authentication with key agreement scheme on ECC for mobile clientserver environments. Theoretical and Applied Informatics, 24(4), pp. 293-312.
    • [18] Wang, D. and Ma, C., 2013. Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ECC. Information Fusion, .
    • [19] Monrose, F., Reiter, M.K., Li, Q. and Wetzel, S., 2001. Cryptographic key generation from voice, Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on 2001, IEEE, pp. 202-213
    • [20] Seto, Y, 2002. Development of personal authentication systems using fingerprint with smart cards and digital signature technologies, The Seventh International Conference on Control, Automation, Robotics and Vision.
    • [21] Clancy T.C., Kiyavash, N. and D.J. Lin, D.J., 2003. Secure smart card based fingerprint authentication, Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Application, WBMA.
    • [22] Hao, F, Chan, C.W., 2002. Private key generation from on-line handwritten signatures, Information Management & Computer Security, Issue 10, No. 2, pp. 159-164.
    • [23] Goh, A. and Ngo, D., 2003. Computation of cryptographic keys from face biometrics. Communications and Multimedia Security.Advanced Techniques for Network and Data Protection, , pp. 1-13.
    • [24] Hwang, M., Lee, C. and Tang, Y., 2002. A simple remote user authentication scheme. Mathematical and Computer Modelling, 36(1), pp. 103-107.
    • [25] Lin, C. and Lai, Y., 2004. A flexible biometrics remote user authentication scheme. Computer Standards & Interfaces, 27(1), pp. 19- 23.
    • [26] Lee, N. and Chiu, Y., 2005. Improved remote authentication scheme with smart card. Computer Standards & Interfaces, 27(2), pp. 177-180.
    • [27] Chang, Y., Chang, C. and Su, Y., 2006. A secure improvement on the user-friendly remote authentication scheme with no time concurrency mechanism, Advanced Information Networking and Applications, 2006. AINA 2006. 20th International Conference on 2006, IEEE, pp. 5 pp.
    • [28] Inuma, M., Otsuka, A. and Imai, H., 2009. Theoretical framework for constructing matching algorithms in biometric authentication systems. Advances in Biometrics. Springer, pp. 806-815.
    • [29] Lu, J., Zhang, S. and QIE, S., 2011. Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards. IACR Cryptology ePrint Archive, 2011, pp. 676.
    • [30] Jeon, S., Kim, H. and Kim, M., 2011. Enhanced biometrics-based remote user authentication scheme using smart cards. J.of Security Engineering, 8(2), pp. 237-254.
    • [31] Li, X., Niu, J., Ma, J., Wang, W. and Liu, C., 2011. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer
    • [32] Hopcroft, J.E., Je rey D. Ullman. 1979. Introduction to automata theory, languages, and computation.
    • [33] Stallings, W., 2011. Cryptography and Network Security, 5/E. Pearson Education, Inc.
    • [34] Yokoyama, V.T.V., 2000. Elliptic curve cryptosystem. Fujitsu Sci.Tech.J, 36(2), pp. 140-146.
    • [35] Petri, C.A., 1962. Kommunikation mit Automaten. Ph. D. Thesis, University of Bonn.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article