Secure remote authentication using biometric data

被引:0
|
作者
Boyen, X
Dodis, Y
Katz, J
Ostrovsky, R
Smith, A
机构
[1] NYU, New York, NY USA
[2] Univ Maryland, College Pk, MD 20742 USA
[3] Univ Calif Los Angeles, Los Angeles, CA 90024 USA
[4] Weizmann Inst Sci, Rehovot, Israel
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are not uniformly distributed-, and (2) they are not exactly reproducible. Recent work, most notably that of Dodis, Reyzin, and Smith, has shown how these obstacles may be overcome by allowing some auxiliary public information to be reliably sent from a server to the human user. Subsequent work of Boyen has shown how to extend these techniques, in the random oracle model, to enable unidirectional authentication from the user to the server without the assumption of a reliable communication channel. We show two efficient techniques enabling the use of biometric data to achieve mutual authentication or authenticated key exchange over a completely insecure (i.e., adversarially controlled) channel. In addition to achieving stronger security guarantees than the work of Boyen, we improve upon his solution in a number of other respects: we tolerate a broader class of errors and, in one case, improve upon the parameters of his solution and give a proof of security in the standard model.
引用
收藏
页码:147 / 163
页数:17
相关论文
共 50 条
  • [1] Private Eyes: Secure Remote Biometric Authentication
    Syta, Ewa
    Fischer, Michael J.
    Wolinsky, David
    Silberschatz, Abraham
    Gallegos-Garcia, Gina
    Ford, Bryan
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 243 - 250
  • [2] Secure Authentication Using Biometric Methods
    Rejman-Greene, Marek
    Information Security Technical Report, 2002, 7 (03): : 30 - 40
  • [3] An efficient and secure biometric remote user authentication scheme using smart cards
    Wang, Xiaomin
    Zhang, Wenfang
    PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 1864 - +
  • [4] Embedded biometric data for a secure authentication watermarking
    Abd Allah, Mohamed Mostafa
    PROCEEDINGS OF THE FOURTH IASTED INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, PATTERN RECOGNITION, AND APPLICATIONS, 2007, : 191 - 196
  • [5] Authentication method to secure cloud data centres using biometric technology
    Giri, Suresh
    Su, Jinfeng
    Zajko, George
    Prasad, P.W.C.
    CITISIA 2020 - IEEE Conference on Innovative Technologies in Intelligent Systems and Industrial Applications, Proceedings, 2020,
  • [6] Secure Authentication Using Biometric Templates in Kerberos
    Maheshwari, Radhika
    Gupta, Apoorva
    Chandra, Nidhi
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1247 - 1250
  • [7] Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication
    Sy, Bon
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5376 : 143 - 154
  • [8] A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices
    Yoon, Eun-Jim
    Yoo, Kee-Young
    ADVANCES IN WEB AND NETWORK TECHNOLOGIES, AND INFORMATION MANAGEMENT, PROCEEDINGS, 2007, 4537 : 612 - +
  • [9] Remote Multimodal Biometric Authentication using Visual Cryptography
    Kaur, Harkeerat
    Khanna, Pritee
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2018, VOL 2, 2020, 1024 : 13 - 25
  • [10] On privacy in secure biometric authentication systems
    Ignatenko, Tanya
    Willems, Frans
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 121 - +