Privacy Preserving Biometrics-Based and User Centric Authentication Protocol

被引:0
|
作者
Gunasinghe, Hasini [1 ]
Bertino, Elisa [1 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
来源
NETWORK AND SYSTEM SECURITY | 2014年 / 8792卷
关键词
Privacy; Security; Biometrics; Authentication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a privacy preserving biometrics-based authentication protocol by which users can authenticate to different service providers from their own devices without involving identity providers in the transactions. Authentication is performed through a zero-knowledge proof of knowledge protocol which is based on a cryptographic identity token created using the unique, repeatable and revocable biometric identifier of the user and a secret provided by the user which enables two-factor authentication as well. Our approach for generating biometric identifiers from the user's biometric image is based on the support vector machine classification technique in conjunction with a mechanism for feature extraction from the biometric image. The paper includes experimental results on a dataset of iris images and a security and privacy analysis of the protocol.
引用
收藏
页码:389 / 408
页数:20
相关论文
共 50 条
  • [31] Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment
    Manojkumar Vivekanandan
    Sastry V. N.
    Srinivasulu Reddy U.
    Peer-to-Peer Networking and Applications, 2021, 14 : 1572 - 1595
  • [32] Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, Srinivasulu U.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1572 - 1595
  • [33] Privacy Preserving Biometric-based User Authentication Protocol using Smart Cards
    Park, Minsu
    Kim, Hyunsung
    Lee, Sung-Woon
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1541 - 1544
  • [34] Key binding biometrics-based remote user authentication scheme using smart cards
    Al-Saggaf, Alawi A.
    IET BIOMETRICS, 2018, 7 (03) : 278 - 284
  • [35] Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection
    Yang, Wencheng
    Hu, Jiankun
    Wang, Song
    Wu, Qianhong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [36] A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) : 1953 - 1966
  • [37] BioSAKE: Biometrics-based Secure Authentication and Key Exchange
    Nandakumar, Karthik
    2013 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2013,
  • [38] Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
    Madhusudhan, R.
    Shashidhara, R.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 82 - 103
  • [39] Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
    R. Madhusudhan
    Shashidhara R.
    Peer-to-Peer Networking and Applications, 2020, 13 : 82 - 103
  • [40] Evaluation techniques for biometrics-based authentication systems (FRR)
    Bolle, RM
    Pankanti, S
    Ratha, NK
    15TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL 2, PROCEEDINGS: PATTERN RECOGNITION AND NEURAL NETWORKS, 2000, : 831 - 837