Biometric Knowledge Extraction for Multi-Factor Authentication and Key Exchange

被引:6
|
作者
Griffin, Phillip H. [1 ]
机构
[1] Griffin Informat Secur, 1625 Glenwood Ave, Raleigh, NC 27608 USA
来源
关键词
authenticated key exchange; biometrics; knowledge extraction;
D O I
10.1016/j.procs.2015.09.150
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a method for achieving strong, multi-factor and mutual authentication from a biometrics-based protocol for authenticated key exchange (B-AKE). Operation of the protocol relies on knowledge shared by communicating parties, extracted from data collected by biometric sensors. A Diffie-Hellman key-agreement scheme creates a symmetric encryption key using a weak secret, the extracted something-you-know data. This key protects the confidentiality of user credentials and other message data transferred during operation of the B-AKE protocol. If the message recipient possesses the same something-you-know information as the sender, a key is created, the message decrypted, and mutual authentication achieved. Biometric match data recovered from the encrypted message provides a second something-you-are authentication factor. The B-AKE protocol ensures users never reveal their knowledge or biometric credentials to imposter recipients or man-in-the-middle observers. Diffie-Hellman key establishment provides forward secrecy, a highly desirable protocol property, when participants choose fresh random values each time they operate the protocol. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 50 条
  • [31] Practical Threshold Multi-Factor Authentication
    Li, Wenting
    Cheng, Haibo
    Wang, Ping
    Liang, Kaitai
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3573 - 3588
  • [32] Multi-Factor Authentication to Systems Login
    ALSaleem, Bandar Omar
    Alshoshan, Abdullah, I
    [J]. 2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, : 1092 - 1095
  • [33] Commentary: Multi-factor identification and authentication
    Morrison, Rodger
    [J]. INFORMATION SYSTEMS MANAGEMENT, 2007, 24 (04) : 331 - 332
  • [34] Security enhanced multi-factor biometric authentication scheme using bio-hash function
    Choi, Younsung
    Lee, Youngsook
    Moon, Jongho
    Won, Dongho
    [J]. PLOS ONE, 2017, 12 (05):
  • [35] Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
    Zhang, Rui
    Xiao, Yuting
    Sun, Shuzhou
    Ma, Hui
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 625 - 634
  • [36] An efficient multi-factor authenticated key exchange with physically unclonable function
    Byun, Jin Wook
    [J]. 2019 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2019, : 477 - 480
  • [37] Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol
    Ma, Zhiqiang
    He, Jun
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 320 - 337
  • [38] Database Multi-factor Authentication via Pluggable Authentication Modules
    Hamilton, Cameron
    Olmstead, Aspen
    [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 367 - 368
  • [39] A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation
    Thi Ai Thao Nguyen
    Dinh Thanh Nguyen
    Tran Khanh Dang
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY, 2015, 9357 : 77 - 88
  • [40] Development of a Remote Tracking Security Box with Multi-Factor Authentication System Incorporates with a Biometric Sensing Device
    Fahim, Shahriar Rahman
    Shahriar, Saquib
    Islam, Omar Kamrul
    Rahm, Md Ilias
    Sarker, Subrata K.
    Akter, Shahela
    [J]. 2019 5TH IEEE INTERNATIONAL WIE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (WIECON-ECE 2019), 2019,