Secure remote authentication using biometric data

被引:0
|
作者
Boyen, X
Dodis, Y
Katz, J
Ostrovsky, R
Smith, A
机构
[1] NYU, New York, NY USA
[2] Univ Maryland, College Pk, MD 20742 USA
[3] Univ Calif Los Angeles, Los Angeles, CA 90024 USA
[4] Weizmann Inst Sci, Rehovot, Israel
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are not uniformly distributed-, and (2) they are not exactly reproducible. Recent work, most notably that of Dodis, Reyzin, and Smith, has shown how these obstacles may be overcome by allowing some auxiliary public information to be reliably sent from a server to the human user. Subsequent work of Boyen has shown how to extend these techniques, in the random oracle model, to enable unidirectional authentication from the user to the server without the assumption of a reliable communication channel. We show two efficient techniques enabling the use of biometric data to achieve mutual authentication or authenticated key exchange over a completely insecure (i.e., adversarially controlled) channel. In addition to achieving stronger security guarantees than the work of Boyen, we improve upon his solution in a number of other respects: we tolerate a broader class of errors and, in one case, improve upon the parameters of his solution and give a proof of security in the standard model.
引用
收藏
页码:147 / 163
页数:17
相关论文
共 50 条
  • [41] Secure electronic voting machine using multi-modal biometric authentication system, data encryption, and firewall
    Bhatti J.
    Chachra S.
    Walia A.
    Vishal A.
    International Journal of Performability Engineering, 2019, 15 (10): : 2570 - 2577
  • [42] Biometric Hash Generation and User Authentication based on Handwriting using Secure Sketches
    Scheidat, Tobias
    Vielhauer, Claus
    Dittmann, Jana
    2009 PROCEEDINGS OF 6TH INTERNATIONAL SYMPOSIUM ON IMAGE AND SIGNAL PROCESSING AND ANALYSIS (ISPA 2009), 2009, : 550 - 555
  • [43] Design of a Secure Biometric Authentication Framework Using PKI and FIDO in Fintech Environments
    Kim, Jae Jung
    Hong, Seng Phil
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 69 - 79
  • [44] Secure I-voting system using QR code and biometric authentication
    Ajish, S.
    AnilKumar, K. S.
    INFORMATION SECURITY JOURNAL, 2022, 31 (01): : 83 - 104
  • [45] Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
    Cheng Hongbing
    Rong Chunming
    Tan Zhenghua
    Zeng Qingkai
    CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (02): : 254 - 259
  • [46] A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system
    Ben Tarif, Eyad
    Wibowo, Santoso
    Wasimi, Saleh
    Tareef, Afaf
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (02) : 2485 - 2503
  • [47] A Proposal of Efficient Remote Biometric Authentication Protocol
    Sakashita, Taiki
    Shibata, Yoichi
    Yamamoto, Takumi
    Takahashi, Kenta
    Ogata, Wakaha
    Kikuchi, Hiroaki
    Nishigaki, Masakatsu
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 212 - +
  • [48] A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system
    Eyad Ben Tarif
    Santoso Wibowo
    Saleh Wasimi
    Afaf Tareef
    Multimedia Tools and Applications, 2018, 77 : 2485 - 2503
  • [49] Attestation-based remote biometric authentication
    Polon, Thomas
    Sander, Sam
    2006 BIOMETRICS SYMPOSIUM: SPECIAL SESSION ON RESEARCH AT THE BIOMETRIC CONSORTIUM CONFERENCE, 2006, : 37 - +
  • [50] Secure Remote Authentication Using Fingerprint and Fuzzy Private Matching
    Feng, Quan
    Su, Fei
    Cai, Anni
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 290 - 292