A remote user authentication scheme is a procedure for a server to authenticate a remote user in a network. Recently, Lee et al. proposed a fingerprint-based remote user authentication scheme to overcome the security flaw in Hwang and Li's scheme. In Lee et al.'s authentication scheme, they store two secret keys and some public elements in a smart card. We first review Lee et al.'s fingerprint-based user authentication scheme. Next, we show that Lee et al.'s scheme still suffers from the impersonation attack.
J.K. LeeSeung-Hwan RyuKi-Bong Yoo
Hong-Wei SunKwok‐Yan LamMing GuJiaguang Sun
Seung-Soo ShinKun-Hee HanJe-Ran Chun
Kai HuangOu QingyuXiaoping WuYexin Song