Biometric Knowledge Extraction for Multi-Factor Authentication and Key Exchange

被引:6
|
作者
Griffin, Phillip H. [1 ]
机构
[1] Griffin Informat Secur, 1625 Glenwood Ave, Raleigh, NC 27608 USA
来源
关键词
authenticated key exchange; biometrics; knowledge extraction;
D O I
10.1016/j.procs.2015.09.150
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a method for achieving strong, multi-factor and mutual authentication from a biometrics-based protocol for authenticated key exchange (B-AKE). Operation of the protocol relies on knowledge shared by communicating parties, extracted from data collected by biometric sensors. A Diffie-Hellman key-agreement scheme creates a symmetric encryption key using a weak secret, the extracted something-you-know data. This key protects the confidentiality of user credentials and other message data transferred during operation of the B-AKE protocol. If the message recipient possesses the same something-you-know information as the sender, a key is created, the message decrypted, and mutual authentication achieved. Biometric match data recovered from the encrypted message provides a second something-you-are authentication factor. The B-AKE protocol ensures users never reveal their knowledge or biometric credentials to imposter recipients or man-in-the-middle observers. Diffie-Hellman key establishment provides forward secrecy, a highly desirable protocol property, when participants choose fresh random values each time they operate the protocol. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 50 条
  • [41] Internet Banking Login with Multi-Factor Authentication
    Boonkrong, Sirapat
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (01): : 511 - 535
  • [42] Multi-Factor Authentication Using Threshold Cryptography
    Venukumar, Vishnu
    Pathari, Vinod
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1694 - 1698
  • [43] Privacy preserving multi-factor authentication with biometrics
    Bhargav-Spantzel, Abhilasha
    Squicciarini, Anna
    Modi, Shimon
    Young, Matthew
    Bertino, Elisa
    Elliott, Stephen
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (05) : 529 - 560
  • [44] A Systematic Review on Multi-Factor Authentication Framework
    Syahreen, Muhammad
    Hafizah, Noor
    Maarop, Nurazean
    Maslinan, Mayasarah
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (05) : 1043 - 1050
  • [45] A Method of Risk Assessment for Multi-Factor Authentication
    Kim, Jae-Jung
    Hong, Seng-Phil
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2011, 7 (01): : 187 - 198
  • [46] Multi-factor authentication for shibboleth identity providers
    de Mello, Emerson Ribeiro
    Wangham, Michelle Silva
    Loli, Samuel Bristot
    da Silva, Carlos Eduardo
    da Silva, Gabriela Cavalcanti
    de Chaves, Shirlei Aparecida
    Loli, Bruno Bristot
    [J]. JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2020, 11 (01)
  • [47] Multi-Factor Authentication with OpenId in Virtualized Environments
    Alves, J. M.
    Rodrigues, T. G.
    Beserra, D. W.
    Fonseca, J. C.
    Endo, P. T.
    Kelner, J.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2017, 15 (03) : 528 - 533
  • [48] Robust Multi-Factor Authentication for Fragile Communications
    Huang, Xinyi
    Xiang, Yang
    Bertino, Elisa
    Zhou, Jianying
    Xu, Li
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (06) : 568 - 581
  • [49] Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting
    Liu, Ying
    Wei, Fushan
    Ma, Chuangui
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 255 - 267
  • [50] A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things
    Nikravan, Mohammad
    Reza, Akram
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 111 (01) : 463 - 494