Modelling and Simulation of a Biometric Identity-Based Cryptography

Abstract

 Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tends to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. This paper also demonstrates the feasibility of using finite-state machines as a formal method to analyse the proposed protocols. Finally we showed how Petri Nets could be used to simulate the communication patterns between the server and client as well as to validate the protocol functionality.

Authors and Affiliations

Dania Aljeaid, Xiaoqi Ma, Caroline Langensiepen

Keywords

Related Articles

Hand Gesture recognition and classification by Discriminant and Principal Component Analysis using Machine Learning techniques

This paper deals with the recognition of different hand gestures through machine learning approaches and principal component analysis. A Bio-Medical signal amplifier is built after doing a software simulation with the he...

 Blurring and Deblurring Digital Images Using the Dihedral Group

 A new method of blurring and deblurring digital images is presented. The approach is based on using new filters generating from average filter and H-filters using the action of the dihedral group. These filters are...

 Clustering Web Documents based on Efficient Multi-Tire Hashing Algorithm for Mining Frequent Termsets

 Document Clustering is one of the main themes in text mining. It refers to the process of grouping documents with similar contents or topics into clusters to improve both availability and reliability of text mining...

Wearable Computing System with Input-Output Devices Based on Eye-Based Human Computer Interaction Allowing Location Based Web Services

Wearable computing with Input-Output devices Base on Eye-Based Human Computer Interaction: EBHCI which allows location based web services including navigation, location/attitude/health condition monitoring is proposed. T...

 An Empirical Comparison of Tree-Based Learning Algorithms: An Egyptian Rice Diseases Classification Case Study

 Applications of learning algorithms in knowledge discovery are promising and relevant area of research. The classification algorithms of data mining have been successfully applied in the recent years to predict Egy...

Download PDF file
  • EP ID EP132008
  • DOI 10.14569/IJARAI.2014.031005
  • Views 118
  • Downloads 0

How To Cite

Dania Aljeaid, Xiaoqi Ma, Caroline Langensiepen (2014).  Modelling and Simulation of a Biometric Identity-Based Cryptography. International Journal of Advanced Research in Artificial Intelligence(IJARAI), 3(10), 35-44. https://europub.co.uk/articles/-A-132008