Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer

被引:9
|
作者
Kiraz, Mehmet Sabir [1 ]
Genc, Ziya Alper [1 ,3 ]
Kardas, Suleyman [1 ,2 ]
机构
[1] TUBITAK BILGEM UEKAE, Kocaeli, Turkey
[2] Batman Univ, Fac Engn & Architecture, Batman, Turkey
[3] Istanbul Sehir Univ, Istanbul, Turkey
关键词
biometric identification; authentication; Hamming distance; privacy; committed oblivious transfer; AUTHENTICATION PROTOCOL; CRYPTOSYSTEM; BIOMETRICS; PRIVACY;
D O I
10.1002/sec.1329
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses oblivious transfer and provides security in the semi-honest model. The other scheme uses committed oblivious transfer and is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometric authentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form. In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, our attack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance, which is different from the actual value. For biometric authentication systems, this attack allows a malicious adversary to pass the authentication without knowledge of the honest user's input with at most O(n) complexity instead of O(2(n)), where n is the input length. We propose an enhanced version of their protocol where this attack is eliminated. The security of our modified protocol is proven using the simulation-based paradigm. Furthermore, as for efficiency concerns, the modified protocol utilizes verifiable oblivious transfer, which does not require the commitments to outputs, which improves its efficiency significantly. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:4123 / 4135
页数:13
相关论文
共 50 条
  • [41] Toward Wireless Security without Computational Assumptions-Oblivious Transfer Based on Wireless Channel Characteristics
    Hao, Zhuo
    Mao, Yunlong
    Zhong, Sheng
    Li, Li Erran
    Yao, Haifan
    Yu, Nenghai
    IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (06) : 1579 - 1592
  • [42] Security Analysis of YKHL Distance Bounding Protocol with Adjustable False Acceptance Rate
    Kim, Chong Hee
    IEEE COMMUNICATIONS LETTERS, 2011, 15 (10) : 1078 - 1080
  • [43] A Privacy-Preserving Method Based on Server-Aided Reverse Oblivious Transfer Protocol in MCS
    Long, Hao
    Zhang, Shukui
    Zhang, Yang
    Zhang, Li
    Wang, Jin
    IEEE ACCESS, 2019, 7 : 164667 - 164681
  • [44] The efficiency and security of a real quadratic field based key exchange protocol
    Jacobson, MJ
    Scheidler, R
    Williams, HC
    PUBLIC-KEY CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, : 89 - 112
  • [45] Security analysis of security protocol Swift implementations based on computational model
    Meng B.
    He X.
    Zhang J.
    Yao L.
    Lu J.
    Tongxin Xuebao/Journal on Communications, 2018, 39 (09): : 178 - 190
  • [46] A Security Analysis Method for Security Protocol Implementations Based on Message Construction
    Lu, Jintian
    Yao, Lili
    He, Xudong
    Huang, Chintser
    Wang, Dejun
    Meng, Bo
    APPLIED SCIENCES-BASEL, 2018, 8 (12):
  • [47] Formal modeling and security analysis method of security protocol based on CPN
    Gong X.
    Feng T.
    Du J.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (09): : 240 - 253
  • [48] A new biometrics-based key establishment protocol in WBAN: energy efficiency and security robustness analysis
    Sammoud, Amal
    Chalouf, Mohamed Aymen
    Hamdi, Omessaad
    Montavont, Nicolas
    Bouallegue, Ammar
    COMPUTERS & SECURITY, 2020, 96
  • [49] A new biometrics-based key establishment protocol in WBAN: energy efficiency and security robustness analysis
    Sammoud, Amal
    Chalouf, Mohamed Aymen
    Hamdi, Omessaad
    Montavont, Nicolas
    Bouallegue, Ammar
    Computers and Security, 2020, 96
  • [50] High Efficiency Secure Channels for a Secure Multiparty Computation Protocol Based on Signal
    Yang Y.
    Zhang R.
    Security and Communication Networks, 2023, 2023