Skip to main content
. 2019 Mar 6;19(5):1146. doi: 10.3390/s19051146
Step 1: The Ui selects his/her own identity IDi, password PWi, and imprints biometric Fi on the sensor device and then computes Gen(Fi)=(XF, PF), RPWi=h(PWiXF), where Gen(.) is a generate function of fuzzy extractor and (XF, PF) are secret and public key respectively. Now, Ui computes REGi=r0(IDi||RPWi||Ai) and sends { IDipre,REGi} to BS.
Step 2: When the registration request is received from Ui, if BS successfully verifies that (IDipre,r0) is in BS’s storage and has not been registered, then BS computes (IDi||RPWi||Ai)=REGir0, Bi=h(AiX)h(IDiRPWi) and Di= h(Ai  RPWi  IDi). Afterwards, BS computes RSPi=h((IDi||r0)(Bi||Di) and sends {RSPi} to Ui.
Step 3: After receiving the response from BS, Ui computes (Bi||Di)=RSPih((IDi||r0), and embeds Ai, Bi,  Di, h(.), PF and Gen(.) in the memory of SC.