Two-Factor Decryption: A Better Way to Protect Data Security and Privacy

被引:2
|
作者
Cui, Hui [1 ,3 ]
Paulet, Russell [2 ]
Nepal, Surya [3 ]
Yi, Xun [2 ]
Mbimbi, Butrus [1 ]
机构
[1] Murdoch Univ, Discipline Informat Technol Math & Stat, Perth, WA 6150, Australia
[2] RMIT Univ, Sch Sci, Melbourne, Vic 3000, Australia
[3] CSIRO, Data61, Melbourne, Vic 3008, Australia
来源
COMPUTER JOURNAL | 2021年 / 64卷 / 04期
基金
中国国家自然科学基金;
关键词
biometric data; private key; two-factor authentication; generic construction; data security and privacy; ENCRYPTION;
D O I
10.1093/comjnl/bxaa080
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Biometric information is unique to a human, so it would be desirable to use the biometric characteristic as the private key in a cryptographic system to protect data security and privacy. In this paper, we introduce a notion called two-factor decryption (TFD). Informally speaking, a TFD scheme is a variant of the public-key encryption (PKE) scheme. In a TFD scheme, messages are encrypted under public keys as that in a standard PKE scheme, but both private keys (i.e. the first factor) and biometric inputs (i.e. the second factor) are required to decrypt the ciphertexts and obtain the underlying plaintexts. We first describe a framework of TFD, and then define a formal security model for TFD. Thereafter, we present a generic construction on TFD based on the cryptographic primitives of linear sketch and functional encryption (FE) with certain properties and analyse its security. In addition, we give instantiations of TFD by applying concrete FE schemes into the generic construction and show their applications.
引用
收藏
页码:550 / 563
页数:14
相关论文
共 50 条
  • [41] On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
    Sun, Da-Zhi
    Li, Jian-Xin
    Feng, Zhi-Yong
    Cao, Zhen-Fu
    Xu, Guang-Quan
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 895 - 905
  • [42] Security controls in an integrated Biobank to protect privacy in data sharing: rationale and study design
    Takai-Igarashi, Takako
    Kinoshita, Kengo
    Nagasaki, Masao
    Ogishima, Soichi
    Nakamura, Naoki
    Nagase, Sachiko
    Nagaie, Satoshi
    Saito, Tomo
    Nagami, Fuji
    Minegishi, Naoko
    Suzuki, Yoichi
    Suzuki, Kichiya
    Hashizume, Hiroaki
    Kuriyama, Shinichi
    Hozawa, Atsushi
    Yaegashi, Nobuo
    Kure, Shigeo
    Tamiya, Gen
    Kawaguchi, Yoshio
    Tanaka, Hiroshi
    Yamamoto, Masayuki
    BMC MEDICAL INFORMATICS AND DECISION MAKING, 2017, 17
  • [43] Security controls in an integrated Biobank to protect privacy in data sharing: rationale and study design
    Takako Takai-Igarashi
    Kengo Kinoshita
    Masao Nagasaki
    Soichi Ogishima
    Naoki Nakamura
    Sachiko Nagase
    Satoshi Nagaie
    Tomo Saito
    Fuji Nagami
    Naoko Minegishi
    Yoichi Suzuki
    Kichiya Suzuki
    Hiroaki Hashizume
    Shinichi Kuriyama
    Atsushi Hozawa
    Nobuo Yaegashi
    Shigeo Kure
    Gen Tamiya
    Yoshio Kawaguchi
    Hiroshi Tanaka
    Masayuki Yamamoto
    BMC Medical Informatics and Decision Making, 17
  • [44] User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking
    Gunson, Nancie
    Marshall, Diarmid
    Morton, Hazel
    Jack, Mervyn
    COMPUTERS & SECURITY, 2011, 30 (04) : 208 - 220
  • [45] 2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET
    Wang, Fei
    Xu, Yongjun
    Zhang, Hanwen
    Zhang, Yujun
    Zhu, Liehuang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (02) : 896 - 911
  • [46] Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
    Wang, Ding
    Wang, Nan
    Wang, Ping
    Qing, Sihan
    INFORMATION SCIENCES, 2015, 321 : 162 - 178
  • [47] Enhancing Security of the Reduced-Operation Two-Factor Authentication by Using Ambient WiFi
    LIU Dong
    CHEN Jing
    DU Ruiying
    ZHANG Huanguo
    Chinese Journal of Electronics, 2018, 27 (03) : 625 - 633
  • [48] An efficient two-factor authentication protocol based on elliptic curve cryptosystem with provable security
    Chen, Yulei
    Chen, Jianhua
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (09)
  • [49] On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Hamed Arshad
    Vahid Teymoori
    Morteza Nikooghadam
    Hassan Abbassi
    Journal of Medical Systems, 2015, 39
  • [50] Enhancing Web Application Security: Advanced Biometric Voice Verification for Two-Factor Authentication
    Kaminski, Kamil Adam
    Dobrowolski, Andrzej Piotr
    Piotrowski, Zbigniew
    Scibiorek, Przemyslaw
    ELECTRONICS, 2023, 12 (18)