Modelling and Simulation of a Biometric Identity-Based Cryptography

Abstract

 Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tends to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. This paper also demonstrates the feasibility of using finite-state machines as a formal method to analyse the proposed protocols. Finally we showed how Petri Nets could be used to simulate the communication patterns between the server and client as well as to validate the protocol functionality.

Authors and Affiliations

Dania Aljeaid, Xiaoqi Ma, Caroline Langensiepen

Keywords

Related Articles

 External analysis of strategic market management can be realized based upon different human mindset–A debate in the light of statistical perspective

  The paper entails the statistical correlation of the investigations carried out for the sales and profit prediction and analysis by persons of different mindsets in case of strategic uncertainty . The paper by vir...

Weapon Target Assignment with Combinatorial Optimization Techniques

Weapon Target Assignment (WTA) is the assignment of friendly weapons to the hostile targets in order to protect friendly assets or destroy the hostile targets and considered as a NP-complete problem. Thus, it is very har...

 The Solution of Machines’ Time Scheduling Problem Using Artificial Intelligence Approaches

 The solution of the Machines’ Time Scheduling Problem (MTSP) is a hot point of research that is not yet matured, and needs further work. This paper presents two algorithms for the solution of the Machines’ Time Sch...

 Improving Performance Analysis Of Routing Efficiency In Wireless Sensor Networks Using Greedy Algorithm

 The void problem causing the routing failure is the main challenge of the greedy routing in the wireless sensor networks. The current research work still can not fully deal with the void problem since the excessive...

 A More Intelligent Literature Search

 Although the topic of study relates to an environmental/health issue, it is the methodology described which serves to showcase an embryonic form of a new “more intelligent” protocol of search algorithm. Through the...

Download PDF file
  • EP ID EP132008
  • DOI 10.14569/IJARAI.2014.031005
  • Views 123
  • Downloads 0

How To Cite

Dania Aljeaid, Xiaoqi Ma, Caroline Langensiepen (2014).  Modelling and Simulation of a Biometric Identity-Based Cryptography. International Journal of Advanced Research in Artificial Intelligence(IJARAI), 3(10), 35-44. https://europub.co.uk/articles/-A-132008