{"id":"https://openalex.org/W4405232306","doi":"https://doi.org/10.1109/jiot.2024.3514821","title":"Secure User Authentication Scheme Using Revocable Biometrics Based on Secret Sharing for Smart Home","display_name":"Secure User Authentication Scheme Using Revocable Biometrics Based on Secret Sharing for Smart Home","publication_year":2024,"publication_date":"2024-12-11","ids":{"openalex":"https://openalex.org/W4405232306","doi":"https://doi.org/10.1109/jiot.2024.3514821"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3514821","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3514821","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108057782","display_name":"Yao Hu","orcid":"https://orcid.org/0000-0003-4573-5740"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yao Hu","raw_affiliation_strings":["School of Computer and Information and the Anhui Province Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China","School of Computer and Information, Anhui Normal University, Wuhu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Information and the Anhui Province Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]},{"raw_affiliation_string":"School of Computer and Information, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042471611","display_name":"Weixin Bian","orcid":"https://orcid.org/0000-0003-2341-5359"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weixin Bian","raw_affiliation_strings":["School of Computer and Information and the Anhui Province Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China","School of Computer and Information, Anhui Normal University, Wuhu, China"],"raw_orcid":"https://orcid.org/0000-0003-2341-5359","affiliations":[{"raw_affiliation_string":"School of Computer and Information and the Anhui Province Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]},{"raw_affiliation_string":"School of Computer and Information, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015372133","display_name":"Dong Xie","orcid":"https://orcid.org/0000-0001-9858-3782"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Xie","raw_affiliation_strings":["School of Computer and Information and the Anhui Province Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China","School of Computer and Information, Anhui Normal University, Wuhu, China"],"raw_orcid":"https://orcid.org/0000-0001-9858-3782","affiliations":[{"raw_affiliation_string":"School of Computer and Information and the Anhui Province Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]},{"raw_affiliation_string":"School of Computer and Information, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023571033","display_name":"Zilong Xu","orcid":"https://orcid.org/0000-0003-1690-1383"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zilong Xu","raw_affiliation_strings":["School of Computer and Information and the Anhui Province Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China","School of Computer and Information, Anhui Normal University, Wuhu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Information and the Anhui Province Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]},{"raw_affiliation_string":"School of Computer and Information, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056566237","display_name":"Peng He","orcid":"https://orcid.org/0000-0002-0378-0300"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng He","raw_affiliation_strings":["School of Computer and Information and the Anhui Province Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China","School of Computer and Information, Anhui Normal University, Wuhu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Information and the Anhui Province Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]},{"raw_affiliation_string":"School of Computer and Information, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5108057782"],"corresponding_institution_ids":["https://openalex.org/I4472751"],"apc_list":null,"apc_paid":null,"fwci":0.6576,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.69702592,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"12","issue":"8","first_page":"10885","last_page":"10898"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9271000027656555,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9271000027656555,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.9049000144004822,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7985289692878723},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7532063126564026},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7004403471946716},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5700646638870239},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5659845471382141},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.5447611808776855},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.5057713985443115},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46100518107414246},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.38222724199295044},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.33528047800064087}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7985289692878723},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7532063126564026},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7004403471946716},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5700646638870239},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5659845471382141},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.5447611808776855},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.5057713985443115},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46100518107414246},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.38222724199295044},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33528047800064087},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3514821","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3514821","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4898888742","display_name":null,"funder_award_id":"61801004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7891985910","display_name":null,"funder_award_id":"2108085MF206","funder_id":"https://openalex.org/F4320334897","funder_display_name":"Natural Science Foundation of Anhui Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334897","display_name":"Natural Science Foundation of Anhui Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1490122681","https://openalex.org/W1573182127","https://openalex.org/W2029693536","https://openalex.org/W2125587922","https://openalex.org/W2162006472","https://openalex.org/W2342772375","https://openalex.org/W2514873781","https://openalex.org/W2516575313","https://openalex.org/W2755909956","https://openalex.org/W2766472919","https://openalex.org/W2775405389","https://openalex.org/W2777595189","https://openalex.org/W2913224859","https://openalex.org/W2914062206","https://openalex.org/W2915512979","https://openalex.org/W2942680566","https://openalex.org/W2949592078","https://openalex.org/W2963396738","https://openalex.org/W3010452742","https://openalex.org/W3010704820","https://openalex.org/W3118621606","https://openalex.org/W3121545277","https://openalex.org/W3132805797","https://openalex.org/W3214764886","https://openalex.org/W4206119113","https://openalex.org/W4220982221","https://openalex.org/W4296706659","https://openalex.org/W4313406111","https://openalex.org/W4386030192"],"related_works":["https://openalex.org/W2076845124","https://openalex.org/W2183964146","https://openalex.org/W2379932303","https://openalex.org/W2095239294","https://openalex.org/W3147744369","https://openalex.org/W2062586268","https://openalex.org/W2094266434","https://openalex.org/W3104966193","https://openalex.org/W1998869137","https://openalex.org/W2059457309"],"abstract_inverted_index":{"The":[0,147],"popularity":[1],"of":[2,11,122,129,159,183],"smart":[3,26,32,42,51,71,103,184],"homes":[4,185],"has":[5,170],"been":[6],"facilitated":[7],"by":[8,70],"the":[9,38,120,127,130,139,157,179],"development":[10],"information":[12,162],"and":[13,16,56,77,118,145,173,181],"communication":[14,34],"technology":[15,96,111],"wireless":[17],"sensors.":[18],"These":[19,60],"technologies":[20],"allow":[21],"users":[22,66],"to":[23,45,112,177],"remotely":[24],"control":[25],"devices":[27],"in":[28,64,102],"their":[29],"homes.":[30],"However,":[31],"home":[33,43,104],"primarily":[35],"relies":[36],"on":[37,93],"Internet,":[39],"which":[40,175],"exposes":[41],"networks":[44],"multiple":[46],"security":[47,121,158,180],"risks,":[48],"such":[49],"as":[50],"device":[52],"capture,":[53],"simulation":[54],"attacks,":[55],"internal":[57],"privilege":[58],"attacks.":[59],"threats":[61],"could":[62],"result":[63],"illegal":[65],"stealing":[67],"data":[68],"transmitted":[69],"devices,":[72],"thereby":[73],"violating":[74],"users\u2019":[75,114],"privacy":[76],"security.":[78],"To":[79,125],"address":[80],"these":[81],"challenges,":[82],"this":[83,152],"article":[84],"proposes":[85],"a":[86],"novel":[87],"revocable":[88,115],"biometric":[89,116,161],"authentication":[90,101,166],"scheme":[91],"based":[92],"secret":[94,109],"sharing":[95,110],"for":[97],"secure":[98],"remote":[99],"user":[100,123,160,188],"environments.":[105],"This":[106],"solution":[107,153],"introduces":[108],"protect":[113,156],"templates":[117],"enhances":[119],"privacy.":[124],"verify":[126],"effectiveness":[128],"proposed":[131],"scheme,":[132],"we":[133],"conducted":[134],"experimental":[135,148],"verification,":[136],"including":[137],"measuring":[138],"equal":[140],"error":[141],"rate":[142],"(EER),":[143],"unlinkability,":[144,174],"revocability.":[146],"results":[149],"demonstrate":[150],"that":[151],"can":[154],"effectively":[155],"while":[163],"maintaining":[164],"high":[165],"accuracy.":[167],"Additionally,":[168],"it":[169],"good":[171],"revocability":[172],"helps":[176],"improve":[178],"safety":[182],"without":[186],"compromising":[187],"experience.":[189]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
