Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer

被引:9
|
作者
Kiraz, Mehmet Sabir [1 ]
Genc, Ziya Alper [1 ,3 ]
Kardas, Suleyman [1 ,2 ]
机构
[1] TUBITAK BILGEM UEKAE, Kocaeli, Turkey
[2] Batman Univ, Fac Engn & Architecture, Batman, Turkey
[3] Istanbul Sehir Univ, Istanbul, Turkey
关键词
biometric identification; authentication; Hamming distance; privacy; committed oblivious transfer; AUTHENTICATION PROTOCOL; CRYPTOSYSTEM; BIOMETRICS; PRIVACY;
D O I
10.1002/sec.1329
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses oblivious transfer and provides security in the semi-honest model. The other scheme uses committed oblivious transfer and is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometric authentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form. In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, our attack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance, which is different from the actual value. For biometric authentication systems, this attack allows a malicious adversary to pass the authentication without knowledge of the honest user's input with at most O(n) complexity instead of O(2(n)), where n is the input length. We propose an enhanced version of their protocol where this attack is eliminated. The security of our modified protocol is proven using the simulation-based paradigm. Furthermore, as for efficiency concerns, the modified protocol utilizes verifiable oblivious transfer, which does not require the commitments to outputs, which improves its efficiency significantly. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:4123 / 4135
页数:13
相关论文
共 50 条
  • [1] SHADE: Secure HAmming DistancE Computation from Oblivious Transfer
    Bringer, Julien
    Chabanne, Herve
    Patey, Alain
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2013 WORKSHOPS, 2013, 7862 : 164 - 176
  • [2] Quantum security analysis of a lattice-based oblivious transfer protocol
    Liu, Mo-meng
    Kraemer, Juliane
    Hu, Yu-pu
    Buchmann, Johannes
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (09) : 1348 - 1369
  • [3] Quantum security analysis of a lattice-based oblivious transfer protocol
    Mo-meng Liu
    Juliane Krämer
    Yu-pu Hu
    Johannes Buchmann
    Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 1348 - 1369
  • [4] A novel quantum protocol for secure hamming distance computation
    Peng, Zhen-wan
    Shi, Run-hua
    Ding, Ran
    Zhang, Fei-fan
    QUANTUM INFORMATION PROCESSING, 2024, 23 (05)
  • [5] Secure Hamming Distance Based Computation and Its Applications
    Jarrous, Ayman
    Pinkas, Benny
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 107 - 124
  • [6] Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance
    Mutlaq, Keyan Abdul-Aziz
    Nyangaresi, Vincent Omollo
    Omar, Mohd Adib
    Abduljabbar, Zaid Ameen
    Abduljaleel, Iman Qays
    Ma, Junchao
    Al Sibahee, Mustafa A.
    PLOS ONE, 2024, 19 (01):
  • [7] Lottery Protocol Using Oblivious Transfer Based on ECC
    Liu, Yining
    Liu, Gao
    Chang, Chin-Chen
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (02): : 279 - 285
  • [8] Universally composable oblivious transfer protocol based on VSPH
    Li, Feng-Hua
    Feng, Tao
    Ma, Jian-Feng
    Tongxin Xuebao/Journal on Communications, 2007, 28 (07): : 28 - 34
  • [9] Towards Wireless Security without Computational Assumptions -An Oblivious Transfer Protocol Based on an Unauthenticated Wireless Channel
    Hao, Zhuo
    Zhong, Sheng
    Li, Li Erran
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 2156 - 2164
  • [10] Fingerprinting protocol based on distributed providers using oblivious transfer
    Shinmyo, Urara
    Kuribayashi, Minoru
    Morii, Masakatu
    Tanaka, Hatsukazu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (10) : 2597 - 2602