Fuzzy Extractors for Biometric Identification

被引:33
作者
Li, Nan [1 ]
Nepal, Surya [1 ]
Guo, Fuchun [2 ]
Mu, Yi [2 ]
Susilo, Willy [2 ]
机构
[1] CSIRO, DATA61, Marsfield, Australia
[2] Univ Wollongong, Ctr Comp & Informat Secur Res, Sch Comp & Informat Technol, Wollongong, NSW, Australia
来源
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017) | 2017年
关键词
AUTHENTICATED KEY AGREEMENT; GENERATE STRONG KEYS;
D O I
10.1109/ICDCS.2017.107
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fuzzy extractor provides key generation from biometrics and other noisy data. The generated key is seamlessly usable for any cryptographic applications because its information entropy is sufficient for security. Biometric authentication offers natural and passwordless user authentication in various systems where fuzzy extractors can be used for biometric information security. Typically, a biometric system operates in two modes: verification and identification. However, existing fuzzy extractors does not support efficient user identification. In this paper, we propose a succinct fuzzy extractor scheme which enables efficient biometric identification as well as verification that it satisfies the security requirements. We show that the proposed scheme can be easily used in both verification and identification modes. To the best of our knowledge, we propose the first fuzzy extractor based biometric identification protocol. The proposed protocol is able to identify a user with constant computational cost rather than linear-time computation required by other fuzzy extractor schemes. We also provide security analysis of proposed schemes to show their security levels. The implementation shows that the performance of proposed identification protocol is constant and it is close to that of verification protocols.
引用
收藏
页码:667 / 677
页数:11
相关论文
共 22 条
  • [21] Biometric cryptosystems: Issues and challenges
    Uludag, U
    Pankanti, S
    Prabhakar, S
    Jain, AK
    [J]. PROCEEDINGS OF THE IEEE, 2004, 92 (06) : 948 - 960
  • [22] XAVIER BOYEN., 2004, ACM Conference on Computer and Communications Security, P82, DOI DOI 10.1145/1030083.1030096