A Framework for UC Secure Privacy Preserving Biometric Authentication Using Efficient Functional Encryption

被引:4
|
作者
Ernst, Johannes [1 ]
Mitrokotsa, Aikaterini [1 ]
机构
[1] Univ St Gallen, St Gallen, Switzerland
关键词
cryptographic protocols; biometric authentication; privacy preserving computation; universal composability;
D O I
10.1007/978-3-031-33491-7_7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Despite its popularity, password based authentication is susceptible to various kinds of attacks, such as online or offline dictionary attacks. Employing biometric credentials in the authentication process can strengthen the provided security guarantees, but raises significant privacy concerns. This is mainly due to the inherent variability of biometric readings that prevents us from simply applying a standard hash function to them. In this paper we first propose an ideal functionality for modeling secure, privacy preserving biometric based two-factor authentication in the framework of universal composability (UC). The functionality is of independent interest and can be used to analyze other two-factor authentication protocols. We then present a generic protocol for biometric based two-factor authentication and prove its security (relative to our proposed functionality) in the UC framework. The first factor in our protocol is the possession of a device that stores the required secret keys and the second factor is the user's biometric template. Our construction can be instantiated with function hiding functional encryption, which computes for example the distance of the encrypted templates or the predicate indicating whether the templates are close enough. Our contribution can be split into three parts: - We model privacy preserving biometric based two-factor authentication as an ideal functionality in the UC framework. To the best of our knowledge, this is the first description of an ideal functionality for biometric based two-factor authentication in the UC framework. - We propose a general protocol that uses functional encryption and prove that it UC-realizes our ideal functionality. - We show how to instantiate our framework with efficient, state of the art inner-product functional encryption. This allows the computation of the Euclidean distance, Hamming distance or cosine similarity between encrypted biometric templates. In order to show its practicality, we implemented our protocol and evaluated its performance.
引用
收藏
页码:167 / 196
页数:30
相关论文
共 50 条
  • [1] Secure and Privacy Preserving Biometric Authentication Using Watermarking Technique
    Pal, Doyel
    Khethavath, Praveenkumar
    Thomas, Johnson P.
    Chen, Tingting
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 146 - 156
  • [2] Efficient and Secure Cancelable Biometric Authentication Framework Based on Genetic Encryption Algorithm
    El-Shafai, Walid
    Mohamed, Fatma A. Hossam Eldein
    Elkamchouchi, Hassan M. A.
    Abd-Elnaby, Mohammed
    Elshafee, Ahmed
    [J]. IEEE ACCESS, 2021, 9 : 77675 - 77692
  • [3] Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication
    Sy, Bon
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5376 : 143 - 154
  • [4] Secure and Privacy Preserving Method for Biometric Template Protection using Fully Homomorphic Encryption
    Jindal, Arun Kumar
    Shaik, Imtiyazuddin
    Vasudha, Vasudha
    Chalamala, Srinivasa Rao
    Rajan, M. A.
    Lodha, Sachin
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1128 - 1135
  • [5] A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation
    Jegede, Abayomi
    Udzir, Nur Izura
    Abdullah, Azizol
    Mahmod, Ramlan
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 341 - 352
  • [6] A Survey on Biometric Authentication: Towards Secure and Privacy-Preserving Identification
    Rui, Zhang
    Yan, Zheng
    [J]. IEEE ACCESS, 2019, 7 : 5994 - 6009
  • [7] On privacy in secure biometric authentication systems
    Ignatenko, Tanya
    Willems, Frans
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 121 - +
  • [8] An Enhanced Privacy Preserving, Secure and Efficient Authentication Protocol for VANET
    Khan, Safiullah
    Raza, Ali
    Hwang, Seong Oun
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (02): : 3703 - 3719
  • [9] PEBASI: A Privacy preserving, Efficient Biometric Authentication Scheme based on Irises
    Gunasinghe, Hasini
    Atallah, Mikhail
    Bertino, Elisa
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2024, 27 (03)
  • [10] Privacy-Preserving Biometric Matching Using Homomorphic Encryption
    Pradel, Gaetan
    Mitchell, Chris
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 494 - 505