A secure biometric authentication based on PEKS

被引:8
|
作者
Zhang, Yue [1 ]
Qin, Jing [1 ]
Du, Lihua [2 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
[2] PetroChina Jilin Oilfield Co, Songyuan, Jilin, Peoples R China
来源
关键词
authentication; biometric; PEKS; searchable encryption; privacy; PRIVACY;
D O I
10.1002/cpe.3539
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Biometrics refers to metrics related to human characteristics and traits such as finger prints. How to use biometric to replace an encryption key or an identity certificate efficiently and securely is a hot topic in this big data era. In this field, secure biometric authentication is an important application, which refers to automated authentication based on their encrypted biological and behavioral traits. Searchable encryption is a powerful technology supporting retrieval for encrypted data with specific encrypted keyword index. It also has a profound meaning in the big data field. In this paper, we propose a generic transformation from searchable encryption to secure biometric authentication and construct a specific secure biometric authentication scheme based on public key encryption with keyword search (PEKS). The security of this authentication relies on the distinguishability of trapdoors and indexes in PEKS. In our scheme, the user does not need to claim the target user to authenticate in authentication message, and we change the pattern of authenticating by one bit. Compared with some existing authentication scheme, the proposed scheme is more efficient in the practical application. Furthermore, searchable encryption is an earlier cryptographic system that has relatively mature methods. Our transformation from searchable encryption to secure biometric authentication presents a new direction of constructing authentication scheme. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:1111 / 1123
页数:13
相关论文
共 50 条
  • [21] Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking
    Bin Ma
    Yunhong Wang
    Chunlei Li
    Zhaoxiang Zhang
    Di Huang
    Multimedia Tools and Applications, 2014, 72 : 637 - 666
  • [22] Private Eyes: Secure Remote Biometric Authentication
    Syta, Ewa
    Fischer, Michael J.
    Wolinsky, David
    Silberschatz, Abraham
    Gallegos-Garcia, Gina
    Ford, Bryan
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 243 - 250
  • [23] Secure remote authentication using biometric data
    Boyen, X
    Dodis, Y
    Katz, J
    Ostrovsky, R
    Smith, A
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 147 - 163
  • [24] Secure biometric authentication for weak computational devices
    Atallah, MJ
    Frikken, KB
    Goodrich, MT
    Tamassia, R
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 357 - 371
  • [25] Secure Authentication Using Biometric Templates in Kerberos
    Maheshwari, Radhika
    Gupta, Apoorva
    Chandra, Nidhi
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1247 - 1250
  • [26] Incremental Design of Secure Biometric Identification and Authentication
    Zhou, Linghui
    Oechtering, Tobias J.
    Skoglund, Mikael
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 3196 - 3201
  • [27] Secure speech biometric templates for user authentication
    Inthavisas, K.
    Lopresti, D.
    IET BIOMETRICS, 2012, 1 (01) : 46 - 54
  • [28] BASE: a proposed secure biometric authentication system
    Crossingham, Colby G.
    von Solms, Sebastian H.
    POLICIES AND RESEARCH IN IDENTITY MANAGEMENT, 2008, 261 : 91 - 102
  • [29] Presenting the Secure Collapsible Makerspace with Biometric Authentication
    Razak, Muhammad Syafiq Abdul
    Gothandapani, Sundaraja Perumal A.
    Kamal, Noorfazila
    Chellappan, Kalaivani
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2024, 14 (01) : 12880 - 12886
  • [30] Efficient and Secure Template Blinding for Biometric Authentication
    Deshmukh, Siddhant
    Carter, Henry
    Hernandez, Grant
    Traynor, Patrick
    Butler, Kevin
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 480 - 488