Fuzzy Extractors for Biometric Identification

被引:33
作者
Li, Nan [1 ]
Nepal, Surya [1 ]
Guo, Fuchun [2 ]
Mu, Yi [2 ]
Susilo, Willy [2 ]
机构
[1] CSIRO, DATA61, Marsfield, Australia
[2] Univ Wollongong, Ctr Comp & Informat Secur Res, Sch Comp & Informat Technol, Wollongong, NSW, Australia
来源
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017) | 2017年
关键词
AUTHENTICATED KEY AGREEMENT; GENERATE STRONG KEYS;
D O I
10.1109/ICDCS.2017.107
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fuzzy extractor provides key generation from biometrics and other noisy data. The generated key is seamlessly usable for any cryptographic applications because its information entropy is sufficient for security. Biometric authentication offers natural and passwordless user authentication in various systems where fuzzy extractors can be used for biometric information security. Typically, a biometric system operates in two modes: verification and identification. However, existing fuzzy extractors does not support efficient user identification. In this paper, we propose a succinct fuzzy extractor scheme which enables efficient biometric identification as well as verification that it satisfies the security requirements. We show that the proposed scheme can be easily used in both verification and identification modes. To the best of our knowledge, we propose the first fuzzy extractor based biometric identification protocol. The proposed protocol is able to identify a user with constant computational cost rather than linear-time computation required by other fuzzy extractor schemes. We also provide security analysis of proposed schemes to show their security levels. The implementation shows that the performance of proposed identification protocol is constant and it is close to that of verification protocols.
引用
收藏
页码:667 / 677
页数:11
相关论文
共 22 条
  • [1] Boyen X, 2005, LECT NOTES COMPUT SC, V3494, P147
  • [2] Buhan I.R., 2007, P 1 INT WORKSH SEC S, P450
  • [3] Reusable Fuzzy Extractors for Low-Entropy Distributions
    Canetti, Ran
    Fuller, Benjamin
    Paneth, Omer
    Reyzin, Leonid
    Smith, Adam
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 : 117 - 146
  • [4] High security Iris verification system based on random secret integration
    Chin, CS
    Jin, ATB
    Ling, DNC
    [J]. COMPUTER VISION AND IMAGE UNDERSTANDING, 2006, 102 (02) : 169 - 177
  • [5] Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
  • [6] Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    Dodis, Yevgeniy
    Ostrovsky, Rafail
    Reyzin, Leonid
    Smith, Adam
    [J]. SIAM JOURNAL ON COMPUTING, 2008, 38 (01) : 97 - 139
  • [7] Dodis Y, 2006, LECT NOTES COMPUT SC, V4117, P232
  • [8] Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets
    Dodis, Yevgeniy
    Kanukurthi, Bhavana
    Katz, Jonathan
    Reyzin, Leonid
    Smith, Adam
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (09) : 6207 - 6222
  • [9] When Are Fuzzy Extractors Possible?
    Fuller, Benjamin
    Reyzin, Leonid
    Smith, Adam
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 277 - 306
  • [10] A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems
    Huang, Xinyi
    Xiang, Yang
    Chonka, Ashley
    Zhou, Jianying
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (08) : 1390 - 1397