SKA-CaNPT: Secure Key Agreement using Cancelable and Noninvertible Biometrics based on Periodic Transformation

被引:1
|
作者
Eskandarian, Laleh [1 ]
Akdogan, Dilara [1 ]
Karaoglan Altop, Duygu [1 ]
Levi, Albert [1 ]
机构
[1] Sabanci Univ, Fac Engn & Nat Sci, Istanbul, Turkey
来源
PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19) | 2019年
关键词
Biometrics; bio-cryptography; cancelable biometrics; noninvertible biometrics; periodic transformation; fingerprints; key agreement; security analysis; CIRCUITS;
D O I
10.1145/3292006.3300037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, many of the security-providing applications use biometrics-based authentication. However, since each person's biometrics is unique and non-replaceable, once it is compromised, it will be compromised forever. Therefore, it is hard for the users to trust biometrics. To overcome this problem, in this paper, we propose a novel secure key agreement protocol SKA-CaNPT. Here, we use a periodic transformation function to make biometrics cancelable and noninvertible. At the very end of our SKA-CaNPT protocol, the user and the server make an agreement on a symmetric shared key that is based on the feature points of the user's biometrics. Therefore, if the transformed data is compromised, then just by changing one of the inputs of the transformation function, we can renew the cryptographic key. As a proof of concept, we apply our SKA-CaNPT protocol on fingerprints. Besides, we apply different security analyses on our protocol. We use Shannon's entropy and Hamming distance metrics to analyze the randomness and the distinctiveness of the agreed keys. Moreover, according to the low IKGR (Incorrect Key Generation Rate), high CKGR (Correct Key Generation Rate) and high attack complexity possessed by our SKA-CaNPT protocol, we can conclude that our scheme is secure against brute-force, replay and impersonation attacks.
引用
收藏
页码:351 / 362
页数:12
相关论文
共 46 条
  • [31] A secure chaotic maps-based key agreement protocol without using smart cards
    Gong, Peng
    Li, Ping
    Shi, Wenbo
    NONLINEAR DYNAMICS, 2012, 70 (04) : 2401 - 2406
  • [32] A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC
    Qi, Mingping
    Chen, Jianhua
    Chen, Yitao
    COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2018, 164 : 101 - 109
  • [33] An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics
    Chuang, Ming-Chin
    Chen, Meng Chang
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) : 1411 - 1418
  • [34] Provably Secure and Efficient Identity-Based Key Agreement Protocol for Independent PKGs Using ECC
    Farash, Mohammad Dabzinejad
    Attari, Mahmoud Ahmadian
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 5 (01): : 55 - 70
  • [35] An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards
    Moon, Jongho
    Choi, Younsung
    Jung, Jaewook
    Won, Dongho
    PLOS ONE, 2015, 10 (12):
  • [36] A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
    Cheng-Chi Lee
    Che-Wei Hsu
    Nonlinear Dynamics, 2013, 71 : 201 - 211
  • [37] A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 1 - 11
  • [38] A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
    Lee, Cheng-Chi
    Hsu, Che-Wei
    NONLINEAR DYNAMICS, 2013, 71 (1-2) : 201 - 211
  • [39] An Improved Secure Dynamic ID-based Remote User Authentication Scheme with Key Agreement using Symmetric Cryptology
    Kim, Mijin
    Nam, Junghyun
    Won, Dongho
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 143 - 151
  • [40] Experimental Demonstration of Security-Enhanced OFDMA-PON Using Chaotic Constellation Transformation and Pilot-Aided Secure Key Agreement
    Zhang, Wei
    Zhang, Chongfu
    Chen, Chen
    Qiu, Kun
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2017, 35 (09) : 1524 - 1530