A novel privacy-preserving biometric authentication scheme

被引:3
作者
Mao, Xuechun [1 ]
Chen, Ying [1 ]
Deng, Cong [2 ]
Zhou, Xiaqing [3 ]
机构
[1] Taizhou Univ, Dept Comp Sci, Taizhou, Zhejiang, Peoples R China
[2] Hangzhou Jinritoutiao Technol Co Ltd, Hangzhou, Zhejiang, Peoples R China
[3] Taizhou Hosp, Med Records Div, Taizhou, Zhejiang, Peoples R China
来源
PLOS ONE | 2023年 / 18卷 / 05期
关键词
COMPLEXITY; PROTOCOL;
D O I
10.1371/journal.pone.0286215
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Most existing secure biometric authentication schemes are server-centric, and users must fully trust the server to store, process, and manage their biometric data. As a result, users' biometric data could be leaked by outside attackers or the service provider itself. This paper first constructs the EDZKP protocol based on the inner product, which proves whether the secret value is the Euclidean distance of the secret vectors. Then, combined with the Cuproof protocol, we propose a novel user-centric biometric authentication scheme called BAZKP. In this scheme, all the biometric data remain encrypted during authentication phase, so the server will never see them directly. Meanwhile, the server can determine whether the Euclidean distance of two secret vectors is within a pre-defined threshold by calculation. Security analysis shows BAZKP satisfies completeness, soundness, and zero-knowledge. Based on BAZKP, we propose a privacy-preserving biometric authentication system, and its evaluation demonstrates that it provides reliable and secure authentication.
引用
收藏
页数:19
相关论文
共 32 条
[1]   An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks [J].
Azees, Maria ;
Vijayakumar, Pandi ;
Karuppiah, Marimuthu ;
Nayyar, Anand .
WIRELESS NETWORKS, 2021, 27 (03) :2119-2130
[2]   EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks [J].
Azees, Maria ;
Vijayakumar, Pandi ;
Deboarh, Lazarus Jegatha .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) :2467-2476
[3]  
Barni M, 2010, MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, P231
[4]  
Blanton M, 2011, LECT NOTES COMPUT SC, V6879, P190, DOI 10.1007/978-3-642-23822-2_11
[5]   Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting [J].
Bootle, Jonathan ;
Cerulli, Andrea ;
Chaidos, Pyrros ;
Groth, Jens ;
Petit, Christophe .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 :327-357
[6]  
BRICKELL EF, 1988, LECT NOTES COMPUT SC, V293, P156
[7]   Transparent SNARKs from DARK Compilers [J].
Bunz, Benedikt ;
Fisch, Ben ;
Szepieniec, Alan .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 :677-706
[8]   Bulletproofs: Short Proofs for Confidential Transactions and More [J].
Bunz, Benedikt ;
Bootle, Jonathan ;
Boneh, Dan ;
Poelstra, Andrew ;
Wuille, Pieter ;
Maxwell, Greg .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :315-334
[9]  
Chan A, 1998, LECT NOTES COMPUT SC, V1403, P561, DOI 10.1007/BFb0054154
[10]  
Deng C, 2021, CUPROOF NOVEL RANGE