JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Biometric Authentication Protocol Using Hidden Vector Key Encapsulation Mechanism
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Biometric Authentication Protocol Using Hidden Vector Key Encapsulation Mechanism
Seo, Minhye; Hwang, Jung Yeon; Kim, Soo-hyung; Park, Jong Hwan;
  PDF(new window)
 Abstract
Biometric authentication is considered as being an efficient authentication method, since a user is not required to possess or memorize any other information other than biometrics. However, since biometric information is sensitive and could be permanently unavailable in case of revealing that information just once, it is essential to preserve privacy of biometrics. In addition, since noise is inherent in the user of biometric recognition technologies, the biometric authentication needs to handle the noise. Recently, biometric authentication protocols using fuzzy extractor have been actively researched, but the fuzzy extractor-based authentication has a problem that a user should memorize an additional information, called helper data, to deal with their noisy biometric information. In this paper, we propose a novel biometric authentication protocol using Hidden Vector Key Encapsulation Mechanism(HV-KEM) which is one of functional encryption schemes. A primary advantage of our protocol is that a user does not need to possess or memorize any additional information. We propose security requirements of HV-KEM necessary for constructing biometric authentication protocols, and analyze our proposed protocol in terms of correctness, security, and efficiency.
 Keywords
Hidden Vector Key Encapsulation Mechanism;Biometric Authentication;
 Language
Korean
 Cited by
 References
1.
M. Abdalla and D. Pointcheval, "Interactive Diffie-Hellman assumptions with applications to password-based authentication," Proc. of the Financial Cryptography, LNCS 3570, pp. 341-356, Mar. 2005.

2.
M.R. Thompson, A. Essiari and S. Mudumbai, "Certificate-based authorization policy in a PKI environment," ACM Transactions on Information and System Security, vol. 6, no. 4, pp. 566-588, Nov. 2003. crossref(new window)

3.
T.-C. Yeh, H.-Y. Shen and J.-J. Hwang, "A secure one-time password authentication scheme using smart cards," IEICE Transactions on Communications, vol. E85-B, no. 11, pp. 2515-2518, Nov. 2002.

4.
G.M. Ezovski and S.E. Watkins, "The electronic passport and the future of government- issued RFID-based identification," IEEE International Conference on RFID, pp. 15-22, Mar. 2007.

5.
"Apple pay contactless secure payment an d tokenisation," (http://www.apple.com/apple-pay/)

6.
FUJITSU, "PalmSecure," (http://www.fujitsu.com/us/solutions/business-technology/security/palmsecure/palmsecure/)

7.
Y. Dodis, L. Reyzin and A. Smith, "Fuzzy extractor: how to generate strong keys from biometrics and other noisy data," Advances in Cryptology, EUROCRYPT'04, LNCS 3027, pp. 523-540, May 2004.

8.
Y. Dodis, B. Kanukurthi, J. Katz, L. Reyzin and A. Smith, "Robust fuzzy extractors and authenticated key agreement from close secrets," Advances in Cryptology, CRYPTO'06, LNCS 4117, pp. 232-250, Aug. 2004.

9.
A. Arakala, J. Jeffers and K.J. Horadam, "Fuzzy extractors for minutiae-based fingerprint authentication," Advances in Biometrics, ICB'07, LNCS 4642, pp. 760-769, Aug. 2007.

10.
Q. Li, M. Guo and E.-C. Chang, "Fuzzy extractors for asymmetric biometric representations," IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 1-6, Jun. 2008.

11.
D. Boneh, A. Sahai and B. Waters, "Functional encryption: definitions and challenges," Proceedings of the 8th Theory of Cryptography Conference, pp. 253-273, Mar. 2011.

12.
J.H. Park, "Efficient hidden vector encryption for conjunctive queries on encrypted data," IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 10, pp. 1483-1497, Oct. 2011. crossref(new window)

13.
C. Lee and J. Kim, "Cancelable fingerprint templates using minutiae-based bit-strings," Journal of Network and Computer Applications, vol. 33, no. 3, pp. 236-246, May 2010. crossref(new window)

14.
C. Chen and R. Veldhuis, "Extracting biometric binary strings with minimal area under the FRR curve for the hamming distance classifier," Signal Processing, vol. 91, no. 4, pp. 906-918, Apr. 2011. crossref(new window)