Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication

被引:2
|
作者
Seo, Minhye [1 ]
Hwang, Jung Yeon [2 ]
Lee, Dong Hoon [1 ]
Kim, Soohyung [2 ]
Kim, Seung-Hyun [2 ]
Park, Jong Hwan [3 ]
机构
[1] Korea Univ, Ctr Informat Secur Technol, Seoul 02841, South Korea
[2] Elect & Telecommun Res Inst, Daejeon 34129, South Korea
[3] Sangmyung Univ, Dept Comp Sci, Seoul 03016, South Korea
关键词
Biometric authentication; fuzzy vector signature; outlier; privacy; reusability; ENCRYPTION; BIOMETRICS; TEMPLATES; IMAGE;
D O I
10.1109/ACCESS.2019.2919351
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fuzzy authentication uses non-deterministic or noisy data, like biometrics, as an authentication factor. Although the data is extracted from the same individual or source, it can be different for each measurement. As a result, one of the main issues in fuzzy authentication is the effective processing of the fuzziness, while guaranteeing the privacy of the fuzzy data. Biometric data is a typical user-generated fuzzy data and the fuzzy extractor is one of the most promising primitives for biometric authentication these days. In 2016, Canetti et al. proposed the reusable fuzzy extractor, in which multiple keys can be generated with the same biometric data. It can also handle some outliers which occur unexpectedly (owing to an external interference when acquiring the fuzzy data, for example, the presence of dust on a fingerprint image). However, the size of the user's helper data in the reusable fuzzy extractor is quite large. This makes the network bandwidth usage required in the online authentication phase (or the storage required on the user side) considerable, which inconveniences the user. In this paper, we present a new primitive for fuzzy authentication, called a fuzzy vector signature (FVS) scheme, which significantly alleviates the burden on the user side. This means that the network bandwidth usage (or the amount of storage required on the user side) is significantly reduced. The proposed FVS scheme is reusable and robust to outliers as well. Finally, we provide a privacy-preserving fuzzy authentication protocol based on the FVS scheme.
引用
收藏
页码:69892 / 69906
页数:15
相关论文
共 50 条
  • [21] A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles
    Aman, Muhammad Naveed
    Javaid, Uzair
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) : 1123 - 1139
  • [22] Efficient Privacy-Preserving Authentication in Wireless Mobile Networks
    Jo, Hyo Jin
    Paik, Jung Ha
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (07) : 1469 - 1481
  • [23] Privacy-Preserving Universal Authentication Protocol for Wireless Communications
    He, Daojing
    Bu, Jiajun
    Chan, Sammy
    Chen, Chun
    Yin, Mingjian
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) : 431 - 436
  • [24] Privacy-preserving continuous authentication using behavioral biometrics
    Ahmed Fraz Baig
    Sigurd Eskeland
    Bian Yang
    International Journal of Information Security, 2023, 22 : 1833 - 1847
  • [25] Privacy-Preserving Authentication Systems Using Smart Devices
    Malina, Lukas
    Hajny, Jan
    Martinasek, Zdenek
    2016 39TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2016, : 11 - 14
  • [26] A comprehensive survey on authentication and privacy-preserving schemes in VANETs
    Mundhe, Pravin
    Verma, Shekhar
    Venkatesan, S.
    COMPUTER SCIENCE REVIEW, 2021, 41
  • [27] Privacy-Preserving Smart Metering with Authentication in a Smart Grid
    Hur, Jun Beom
    Koo, Dong Young
    Shin, Young Joo
    APPLIED SCIENCES-BASEL, 2015, 5 (04): : 1503 - 1527
  • [28] Privacy-preserving continuous authentication using behavioral biometrics
    Baig, Ahmed Fraz
    Eskeland, Sigurd
    Yang, Bian
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (06) : 1833 - 1847
  • [29] A review of privacy-preserving biometric identification and authentication protocols
    Zeng, Li
    Shen, Peisong
    Zhu, Xiaojie
    Tian, Xue
    Chen, Chi
    COMPUTERS & SECURITY, 2025, 150
  • [30] Lightweight and Privacy-Preserving Authentication Protocol for Smart Village
    Panigrahi, Ranjeet Kumar
    Kumar, Raghvendra
    INTERNET TECHNOLOGY LETTERS, 2024,