Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor
نویسندگان
چکیده
Encryption and authentication schemes suffice for the security of information stored or exchanged by different parties, but secure key generation and distribution is a highly non-trivial matter in cryptography. Fuzzy extractor is a security primitive, which can be used to encrypt and authenticate a message using his biometric b to reproduce extraction of an almost uniformly key from non-uniform source such as fingerprint and iris, voice sample etc, is allowed to decrypt ciphertexts created by biometric b, if and only if the two sets b and b are close to a measured set-overlap-distance metric. Biometric security systems are being widely used for the maximum level of security requirements because of the unique of participant’s biometric characteristic. In this paper, it proposes a novel multiple biometric based encryption and authentication scheme that provides confidentiality, undeniability, unforgeability and verifiability. It employs multiple biometrics to encrypt the message, and with the help of public value produced by fuzzy extractor it can reproduce the secure key from distinction biometric to decrypt the ciphertext. It also gives the security analysis including semantic secure and unforgeable in the random oracle model.
منابع مشابه
Artemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملSecuring Iris Templates using Double Encryption Method
The important aspect of all verification system is authentication and security. This aspect necessitates the development of a method that ensures user security and privacy. The traditional methods such as tokens and passwords provide security to the users. Uncertainly, the attackers can easily compromise these techniques. In recent years, the combination of biometrics and cryptography technique...
متن کاملA secure authentication scheme based on fuzzy extractor
The biometrics-based authentication schemes are more security and reliable than the traditional authentication schemes, and it is the inevitable trend of future development. However, between the existing schemes, the security of user’s biometric template usua lly be ignored, the user’s information security suffering from a great threat because of that. Recently, Yan et al. proposed a secure bio...
متن کاملChaos-Based Biometrics Template Protection and Secure Authentication
With the increasing development of global economy and information technology, more and more fields require reliable identity authentication. And with information age characterized by digitalization and recessiveness of identity, a key problem to be solved is how to identify a person’s identity accurately and ensure information security. In this regard, a variety of inherent human biometrics wer...
متن کاملFuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things
To improve the quality of service and reduce the possibility of security attacks, a secure and efficient user authentication mechanism is required for Wireless Sensor Networks (WSNs) and the Internet of Things (IoT). Session key establishment between the sensor node and the user is also required for secure communication. In this paper, we perform the security analysis of A.K.Das’s user authenti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 12 شماره
صفحات -
تاریخ انتشار 2011