Two-Factor Decryption: A Better Way to Protect Data Security and Privacy

被引:2
|
作者
Cui, Hui [1 ,3 ]
Paulet, Russell [2 ]
Nepal, Surya [3 ]
Yi, Xun [2 ]
Mbimbi, Butrus [1 ]
机构
[1] Murdoch Univ, Discipline Informat Technol Math & Stat, Perth, WA 6150, Australia
[2] RMIT Univ, Sch Sci, Melbourne, Vic 3000, Australia
[3] CSIRO, Data61, Melbourne, Vic 3008, Australia
来源
COMPUTER JOURNAL | 2021年 / 64卷 / 04期
基金
中国国家自然科学基金;
关键词
biometric data; private key; two-factor authentication; generic construction; data security and privacy; ENCRYPTION;
D O I
10.1093/comjnl/bxaa080
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Biometric information is unique to a human, so it would be desirable to use the biometric characteristic as the private key in a cryptographic system to protect data security and privacy. In this paper, we introduce a notion called two-factor decryption (TFD). Informally speaking, a TFD scheme is a variant of the public-key encryption (PKE) scheme. In a TFD scheme, messages are encrypted under public keys as that in a standard PKE scheme, but both private keys (i.e. the first factor) and biometric inputs (i.e. the second factor) are required to decrypt the ciphertexts and obtain the underlying plaintexts. We first describe a framework of TFD, and then define a formal security model for TFD. Thereafter, we present a generic construction on TFD based on the cryptographic primitives of linear sketch and functional encryption (FE) with certain properties and analyse its security. In addition, we give instantiations of TFD by applying concrete FE schemes into the generic construction and show their applications.
引用
收藏
页码:550 / 563
页数:14
相关论文
共 50 条
  • [1] Unicorn: Two-Factor Attestation for Data Security
    Mannan, Mohammad
    Kim, Beom Heyn
    Ganjali, Afshar
    Lie, David
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 17 - 28
  • [2] On the Security of a Two-Factor Authentication Scheme
    Catuogno, Luigi
    Galdi, Clemente
    INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 245 - +
  • [3] On the (In)Security of Mobile Two-Factor Authentication
    Dmitrienko, Alexandra
    Liebchen, Christopher
    Rossow, Christian
    Sadeghi, Ahmad-Reza
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 365 - 383
  • [4] A Design of Privacy Data Encryption and Decryption System for Data Security in Clouds
    Cheng Wenjuan
    Tong Bing
    Zhou Miaomiao
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 714 - 718
  • [5] Two-Factor Data Security Protection Mechanism for Cloud Storage System
    Liu, Joseph K.
    Liang, Kaitai
    Susilo, Willy
    Liu, Jianghua
    Xiang, Yang
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) : 1992 - 2004
  • [6] Cryptocurrencies with Security Policies and Two-Factor Authentication
    Breuer, Florian
    Goyal, Vipul
    Malavolta, Giulio
    2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 140 - 158
  • [7] How to Protect Data Privacy in Collaborative Network Security
    Burkhart, Martin
    Dimitropoulos, Xenofontas
    ERCIM NEWS, 2012, (90): : 38 - 39
  • [8] IS THERE A BETTER OPTION THAN THE DATA TRANSFER MODEL TO PROTECT DATA PRIVACY?
    Toy, Alan
    Gunasekara, Gehan
    UNIVERSITY OF NEW SOUTH WALES LAW JOURNAL, 2019, 42 (02): : 719 - 746
  • [9] A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes
    Lu Zhou
    Chunpeng Ge
    Chunhua Su
    Science China Information Sciences, 2020, 63
  • [10] Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security
    Choi, Dooho
    Seo, Seung-Hyun
    Oh, Yoon-Seok
    Kang, Yousung
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 335 - 348