A secure biometric authentication based on PEKS

被引:8
|
作者
Zhang, Yue [1 ]
Qin, Jing [1 ]
Du, Lihua [2 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
[2] PetroChina Jilin Oilfield Co, Songyuan, Jilin, Peoples R China
来源
关键词
authentication; biometric; PEKS; searchable encryption; privacy; PRIVACY;
D O I
10.1002/cpe.3539
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Biometrics refers to metrics related to human characteristics and traits such as finger prints. How to use biometric to replace an encryption key or an identity certificate efficiently and securely is a hot topic in this big data era. In this field, secure biometric authentication is an important application, which refers to automated authentication based on their encrypted biological and behavioral traits. Searchable encryption is a powerful technology supporting retrieval for encrypted data with specific encrypted keyword index. It also has a profound meaning in the big data field. In this paper, we propose a generic transformation from searchable encryption to secure biometric authentication and construct a specific secure biometric authentication scheme based on public key encryption with keyword search (PEKS). The security of this authentication relies on the distinguishability of trapdoors and indexes in PEKS. In our scheme, the user does not need to claim the target user to authenticate in authentication message, and we change the pattern of authenticating by one bit. Compared with some existing authentication scheme, the proposed scheme is more efficient in the practical application. Furthermore, searchable encryption is an earlier cryptographic system that has relatively mature methods. Our transformation from searchable encryption to secure biometric authentication presents a new direction of constructing authentication scheme. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:1111 / 1123
页数:13
相关论文
共 50 条
  • [31] Embedded biometric data for a secure authentication watermarking
    Abd Allah, Mohamed Mostafa
    PROCEEDINGS OF THE FOURTH IASTED INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, PATTERN RECOGNITION, AND APPLICATIONS, 2007, : 191 - 196
  • [32] SEMBA: secure multi-biometric authentication
    Bami, Mauro
    Droandi, Giulia
    Lazzeretti, Riccardo
    Pignata, Tommaso
    IET BIOMETRICS, 2019, 8 (06) : 411 - 421
  • [33] Efficient and Secure Cancelable Biometric Authentication Framework Based on Genetic Encryption Algorithm
    El-Shafai, Walid
    Mohamed, Fatma A. Hossam Eldein
    Elkamchouchi, Hassan M. A.
    Abd-Elnaby, Mohammed
    Elshafee, Ahmed
    IEEE ACCESS, 2021, 9 : 77675 - 77692
  • [34] Efficient Multimodal Biometric Recognition for Secure Authentication Based on Deep Learning Approach
    Rajasekar, Vani
    Saracevic, Muzafer
    Hassaballah, Mahmoud
    Karabasevic, Darjan
    Stanujkic, Dragisa
    Zajmovic, Mahir
    Tariq, Usman
    Jayapaul, Premalatha
    INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2023, 32 (03)
  • [35] Secure Biometric Multi-Logon System Based on Current Authentication Technologies
    Tait, Bobby L.
    GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, 2010, 92 : 96 - 103
  • [36] BIAS: A novel secure and efficient biometric-based anonymous authentication scheme
    Zhu, Qiang
    You, Lin
    Hu, Geng-Ran
    Liu, Wei-Nan
    COMPUTER NETWORKS, 2024, 254
  • [37] Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices
    Vorakulpipat, Chalee
    Takahashi, Takeshi
    Rattanalerdnusorn, Ekkachan
    Thaenkaew, Phithak
    Inoue, Daisuke
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 279 - 282
  • [38] Biometric Hash Generation and User Authentication based on Handwriting using Secure Sketches
    Scheidat, Tobias
    Vielhauer, Claus
    Dittmann, Jana
    2009 PROCEEDINGS OF 6TH INTERNATIONAL SYMPOSIUM ON IMAGE AND SIGNAL PROCESSING AND ANALYSIS (ISPA 2009), 2009, : 550 - 555
  • [39] A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User Profiling
    Ayeswarya, S.
    Singh, K. John
    IEEE ACCESS, 2024, 12 : 82996 - 83021
  • [40] Biometric based authentication and access control techniques to secure Mobile Cloud Computing
    Khatri, Sunil Kumar
    Monica
    Vadi, Vikas Rao
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 371 - 377