Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer

被引:9
|
作者
Kiraz, Mehmet Sabir [1 ]
Genc, Ziya Alper [1 ,3 ]
Kardas, Suleyman [1 ,2 ]
机构
[1] TUBITAK BILGEM UEKAE, Kocaeli, Turkey
[2] Batman Univ, Fac Engn & Architecture, Batman, Turkey
[3] Istanbul Sehir Univ, Istanbul, Turkey
关键词
biometric identification; authentication; Hamming distance; privacy; committed oblivious transfer; AUTHENTICATION PROTOCOL; CRYPTOSYSTEM; BIOMETRICS; PRIVACY;
D O I
10.1002/sec.1329
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses oblivious transfer and provides security in the semi-honest model. The other scheme uses committed oblivious transfer and is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometric authentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form. In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, our attack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance, which is different from the actual value. For biometric authentication systems, this attack allows a malicious adversary to pass the authentication without knowledge of the honest user's input with at most O(n) complexity instead of O(2(n)), where n is the input length. We propose an enhanced version of their protocol where this attack is eliminated. The security of our modified protocol is proven using the simulation-based paradigm. Furthermore, as for efficiency concerns, the modified protocol utilizes verifiable oblivious transfer, which does not require the commitments to outputs, which improves its efficiency significantly. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:4123 / 4135
页数:13
相关论文
共 50 条
  • [31] Quantum Anonymous Authenticated Key Exchange Protocol Based on Quantum Oblivious Key Transfer
    Wei Chunyan
    Cai Xiaoqiu
    Wang Tianyin
    Su Qi
    Qin Sujuan
    Gao Fei
    Wen Qiaoyan
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (02) : 341 - 347
  • [32] High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer
    Burra, Sai Sheshank
    Larraia, Enrique
    Nielsen, Jesper Buus
    Nordholt, Peter Sebastian
    Orlandi, Claudio
    Orsini, Emmanuela
    Scholl, Peter
    Smart, Nigel P.
    JOURNAL OF CRYPTOLOGY, 2021, 34 (03)
  • [33] Cryptanalysis of AN RFID Ownership Transfer Protocol Based on Cloud On Security of AN RFID Ownership Transfer Protocol Based on Cloud
    Lee, Cheng-Chi
    Chen, Shun-Der
    Li, Chun-Ta
    Cheng, Chung-Lun
    Lai, Yan-Ming
    2018 5TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2018) / 2018 4TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2018), 2018, : 134 - 139
  • [34] A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace a nd Security Protocol Implementation Ontology
    He, Xudong
    Liu, Jiabing
    Huang, Chin-Tser
    Wang, Dejun
    Meng, Bo
    IEEE ACCESS, 2019, 7 : 131050 - 131067
  • [35] A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer
    Rial, Alfredo
    Balasch, Josep
    Preneel, Bart
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) : 202 - 212
  • [36] Analysis of Distance Based Routing Protocol in VANET
    Nikumbh, D. M.
    Bhoi, A. D.
    Kharadkar, R. D.
    Deshmukh, A. Y.
    2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 829 - 834
  • [37] Analysis of Security Protocol Based on Petri Nets
    Liu, Fengli
    Han, Wei
    Jiang, Mingyue
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 2, 2011, : 48 - 51
  • [38] Security Protocol Analysis Based on Rewriting Approximation
    Liu, Nan
    Zhu, Wen-ye
    Zhu, Yue-fei
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 318 - 322
  • [39] Security enhancement on an RFID ownership transfer protocol based on cloud
    Lee, Cheng-Chi
    Chen, Shun-Der
    Li, Chun-Ta
    Cheng, Chung-Lun
    Lai, Yan-Ming
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 266 - 277
  • [40] Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol
    Bernardo, Danilo Valeros
    Hoang, Doan
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 100 - 114