A secure biometric authentication based on PEKS

被引:8
|
作者
Zhang, Yue [1 ]
Qin, Jing [1 ]
Du, Lihua [2 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
[2] PetroChina Jilin Oilfield Co, Songyuan, Jilin, Peoples R China
来源
关键词
authentication; biometric; PEKS; searchable encryption; privacy; PRIVACY;
D O I
10.1002/cpe.3539
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Biometrics refers to metrics related to human characteristics and traits such as finger prints. How to use biometric to replace an encryption key or an identity certificate efficiently and securely is a hot topic in this big data era. In this field, secure biometric authentication is an important application, which refers to automated authentication based on their encrypted biological and behavioral traits. Searchable encryption is a powerful technology supporting retrieval for encrypted data with specific encrypted keyword index. It also has a profound meaning in the big data field. In this paper, we propose a generic transformation from searchable encryption to secure biometric authentication and construct a specific secure biometric authentication scheme based on public key encryption with keyword search (PEKS). The security of this authentication relies on the distinguishability of trapdoors and indexes in PEKS. In our scheme, the user does not need to claim the target user to authenticate in authentication message, and we change the pattern of authenticating by one bit. Compared with some existing authentication scheme, the proposed scheme is more efficient in the practical application. Furthermore, searchable encryption is an earlier cryptographic system that has relatively mature methods. Our transformation from searchable encryption to secure biometric authentication presents a new direction of constructing authentication scheme. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:1111 / 1123
页数:13
相关论文
共 50 条
  • [21] Private Eyes: Secure Remote Biometric Authentication
    Syta, Ewa
    Fischer, Michael J.
    Wolinsky, David
    Silberschatz, Abraham
    Gallegos-Garcia, Gina
    Ford, Bryan
    [J]. 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 243 - 250
  • [22] Secure biometric authentication for weak computational devices
    Atallah, MJ
    Frikken, KB
    Goodrich, MT
    Tamassia, R
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 357 - 371
  • [23] Secure Authentication Using Biometric Templates in Kerberos
    Maheshwari, Radhika
    Gupta, Apoorva
    Chandra, Nidhi
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1247 - 1250
  • [24] Incremental Design of Secure Biometric Identification and Authentication
    Zhou, Linghui
    Oechtering, Tobias J.
    Skoglund, Mikael
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 3196 - 3201
  • [25] Secure remote authentication using biometric data
    Boyen, X
    Dodis, Y
    Katz, J
    Ostrovsky, R
    Smith, A
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 147 - 163
  • [26] Secure speech biometric templates for user authentication
    Inthavisas, K.
    Lopresti, D.
    [J]. IET BIOMETRICS, 2012, 1 (01) : 46 - 54
  • [27] BASE: a proposed secure biometric authentication system
    Crossingham, Colby G.
    von Solms, Sebastian H.
    [J]. POLICIES AND RESEARCH IN IDENTITY MANAGEMENT, 2008, 261 : 91 - 102
  • [28] Presenting the Secure Collapsible Makerspace with Biometric Authentication
    Razak, Muhammad Syafiq Abdul
    Gothandapani, Sundaraja Perumal A.
    Kamal, Noorfazila
    Chellappan, Kalaivani
    [J]. ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2024, 14 (01) : 12880 - 12886
  • [29] Efficient and Secure Template Blinding for Biometric Authentication
    Deshmukh, Siddhant
    Carter, Henry
    Hernandez, Grant
    Traynor, Patrick
    Butler, Kevin
    [J]. 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 480 - 488
  • [30] SEMBA: secure multi-biometric authentication
    Bami, Mauro
    Droandi, Giulia
    Lazzeretti, Riccardo
    Pignata, Tommaso
    [J]. IET BIOMETRICS, 2019, 8 (06) : 411 - 421