Efficient Verifiable Computation of XOR for Biometric Authentication
نویسندگان
چکیده
This work addresses the security and privacy issues in remote biometric authentication by proposing an efficient mechanism to verify the correctness of the outsourced computation in such protocols. In particular, we propose an efficient verifiable computation of XORing encrypted messages using an XOR linear message authentication code (MAC) and we employ the proposed scheme to build a biometric authentication protocol. The proposed authentication protocol is both secure and privacy-preserving against malicious (as opposed to honestbut-curious) adversaries. Specifically, the use of the verifiable computation scheme together with an homomorphic encryption protects the privacy of biometric templates against malicious adversaries. Furthermore, in order to achieve unlinkability of authentication attempts, while keeping a low communication overhead, we show how to apply Oblivious RAM and biohashing to our protocol. We also provide a proof of security for the proposed solution. Our simulation results show that the proposed authentication protocol is efficient.
منابع مشابه
On Privacy-Preserving Biometric Authentication
Biometric authentication is becoming increasingly popular as a convenient authentication method. However, the privacy and security issues associated with biometric authentication are very serious. Privacy-preserving biometric authentication addresses privacy concerns associated with the use of biometrics and offers a secure solution for user authentication. Given the tremendous expansion of wir...
متن کاملAn Efficient and Reliable Three-Entity Remote User and Server Authentication Technique
Authentication of remote user and server is a great research challenge in today’s advanced wired and wireless communication. Recently Das proposed a flexible remote system authentication using smart card [7]. Xu et al. proved that Khan et al.’s fingerprint based remote user authentication is vulnerable to the impersonation and parallel session attack [10]. In this paper, we show that Das’s sche...
متن کاملVerifiable Delegation of Computation in the Setting of Privacy-Preserving Biometric Authentication Master of Science Thesis in Computer Systems and Networks
Cloud computing has gained popularity due to the growth of internet and the number of devices. Although outsourcing computation tasks to the remote cloud come with great convenience, there are increasing concerns regarding data privacy and computation integrity since the cloud providers are external third parties. Verifiable computation (VC) is a mechanism to let the client verify the computati...
متن کاملA Verifiable Fingerprint Vault Scheme
By adopting a non-interactive information-theoretic secure verifiable secret sharing scheme in an unorthodox way, a verifiable fingerprint vault scheme is presented in this paper. Fuzzy vault scheme is a novel cryptographic construct which can increase the security of the biometric template in a biometric authentication system. It can be also used to bind the cryptographic key and the user in a...
متن کاملAn Efficient and Reliable Three - Entity Remote User and Server Authentication Technique
188 Abstract— Authentication of remote user and server is a great research challenge in today’s advanced wired and wireless communication. Recently Das proposed a flexible remote system authentication using smart card [7]. Xu et al. proved that Khan et al.’s fingerprint based remote user authentication is vulnerable to the impersonation and parallel session attack [10]. In this paper, we show t...
متن کامل