Secure remote authentication using biometric data

被引:0
|
作者
Boyen, X
Dodis, Y
Katz, J
Ostrovsky, R
Smith, A
机构
[1] NYU, New York, NY USA
[2] Univ Maryland, College Pk, MD 20742 USA
[3] Univ Calif Los Angeles, Los Angeles, CA 90024 USA
[4] Weizmann Inst Sci, Rehovot, Israel
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are not uniformly distributed-, and (2) they are not exactly reproducible. Recent work, most notably that of Dodis, Reyzin, and Smith, has shown how these obstacles may be overcome by allowing some auxiliary public information to be reliably sent from a server to the human user. Subsequent work of Boyen has shown how to extend these techniques, in the random oracle model, to enable unidirectional authentication from the user to the server without the assumption of a reliable communication channel. We show two efficient techniques enabling the use of biometric data to achieve mutual authentication or authenticated key exchange over a completely insecure (i.e., adversarially controlled) channel. In addition to achieving stronger security guarantees than the work of Boyen, we improve upon his solution in a number of other respects: we tolerate a broader class of errors and, in one case, improve upon the parameters of his solution and give a proof of security in the standard model.
引用
收藏
页码:147 / 163
页数:17
相关论文
共 50 条
  • [21] Multi-biometric cryptosystem using graph for secure cloud authentication
    Rajan, R. Ashoka
    Kumaran, P.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (05) : 6437 - 6444
  • [22] A Secure and Compact Multimodal Biometric Authentication Scheme using Deep Hashing
    Sivakumar, P.
    Rathnam, B. Ruthu
    Divakar, S.
    Teja, M. Anil
    Prasad, R. Rajendra
    2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, SMART AND GREEN TECHNOLOGIES (ICISSGT 2021), 2021, : 27 - 31
  • [23] Secure Behavioral Biometric Authentication with Leap Motion
    Xiao, Grady
    Milanova, Mariofanna
    Xie, Mengjun
    2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2016, : 112 - 118
  • [24] ECG BASED BIOMETRIC FOR DOUBLY SECURE AUTHENTICATION
    Safie, Sairul I.
    Soraghan, John J.
    Petropoulakis, Lykourgos
    19TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO-2011), 2011, : 2274 - 2278
  • [25] Secure Hamming Distance based Biometric Authentication
    Kulkarni, Rohan
    Namboodiri, Anoop
    2013 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2013,
  • [26] Secure biometric authentication for weak computational devices
    Atallah, MJ
    Frikken, KB
    Goodrich, MT
    Tamassia, R
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 357 - 371
  • [27] Incremental Design of Secure Biometric Identification and Authentication
    Zhou, Linghui
    Oechtering, Tobias J.
    Skoglund, Mikael
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 3196 - 3201
  • [28] Secure speech biometric templates for user authentication
    Inthavisas, K.
    Lopresti, D.
    IET BIOMETRICS, 2012, 1 (01) : 46 - 54
  • [29] BASE: a proposed secure biometric authentication system
    Crossingham, Colby G.
    von Solms, Sebastian H.
    POLICIES AND RESEARCH IN IDENTITY MANAGEMENT, 2008, 261 : 91 - 102
  • [30] Presenting the Secure Collapsible Makerspace with Biometric Authentication
    Razak, Muhammad Syafiq Abdul
    Gothandapani, Sundaraja Perumal A.
    Kamal, Noorfazila
    Chellappan, Kalaivani
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2024, 14 (01) : 12880 - 12886