Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer

被引:9
|
作者
Kiraz, Mehmet Sabir [1 ]
Genc, Ziya Alper [1 ,3 ]
Kardas, Suleyman [1 ,2 ]
机构
[1] TUBITAK BILGEM UEKAE, Kocaeli, Turkey
[2] Batman Univ, Fac Engn & Architecture, Batman, Turkey
[3] Istanbul Sehir Univ, Istanbul, Turkey
关键词
biometric identification; authentication; Hamming distance; privacy; committed oblivious transfer; AUTHENTICATION PROTOCOL; CRYPTOSYSTEM; BIOMETRICS; PRIVACY;
D O I
10.1002/sec.1329
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses oblivious transfer and provides security in the semi-honest model. The other scheme uses committed oblivious transfer and is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometric authentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form. In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, our attack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance, which is different from the actual value. For biometric authentication systems, this attack allows a malicious adversary to pass the authentication without knowledge of the honest user's input with at most O(n) complexity instead of O(2(n)), where n is the input length. We propose an enhanced version of their protocol where this attack is eliminated. The security of our modified protocol is proven using the simulation-based paradigm. Furthermore, as for efficiency concerns, the modified protocol utilizes verifiable oblivious transfer, which does not require the commitments to outputs, which improves its efficiency significantly. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:4123 / 4135
页数:13
相关论文
共 50 条
  • [21] A Practical Privacy-Preserving Cooperative Computation Protocol without Oblivious Transfer for Linear Systems of Equations
    Kang, Ju-Sung
    Hong, Dowon
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2007, 3 (01): : 21 - 25
  • [22] Hamming Distance Model based Power Analysis for Cryptographic Algorithms
    Li, Jie
    Shan, Weiwei
    Tian, Chaoxuan
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 867 - 871
  • [23] Communication-efficient private distance calculation based on oblivious transfer extensions
    Kaghazgaran, Parisa
    Takabi, Hassan
    Currin, Flannery Hope
    Soriano, Armando
    COMPUTERS & SECURITY, 2019, 83 : 93 - 105
  • [24] A Novel Bilateral Oblivious Transfer Protocol Based on Cut-and-Choose Technique
    Ning, Lulu
    Wang, Jian
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (BIGDATASE 2020), 2020, : 49 - 56
  • [25] Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption
    Jiang H.
    Xu Q.
    Liu C.
    Zheng Z.
    Tang Y.
    Wang M.
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (02) : 1327 - 1337
  • [26] Quantum Oblivious Transfer Based on a Quantum Symmetrically Private Information Retrieval Protocol
    Yang, Yu-Guang
    Sun, Si-Jia
    Wang, Yan
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2015, 54 (03) : 910 - 916
  • [27] SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer
    Karakoc, Ferhat
    Nateghizad, Majid
    Erkin, Zekeriya
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [28] Quantum Oblivious Transfer Based on a Quantum Symmetrically Private Information Retrieval Protocol
    Yu-Guang Yang
    Si-Jia Sun
    Yan Wang
    International Journal of Theoretical Physics, 2015, 54 : 910 - 916
  • [29] A privacy-preserving digital rights management protocol based on oblivious transfer scheme
    Jiang Y.
    Yang B.
    International Journal of Digital Content Technology and its Applications, 2011, 5 (05) : 337 - 341
  • [30] High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer
    Sai Sheshank Burra
    Enrique Larraia
    Jesper Buus Nielsen
    Peter Sebastian Nordholt
    Claudio Orlandi
    Emmanuela Orsini
    Peter Scholl
    Nigel P. Smart
    Journal of Cryptology, 2021, 34