Back to Search
Start Over
Biometric Authentication Protocol Using Hidden Vector Key Encapsulation Mechanism
- Source :
- Journal of the Korea Institute of Information Security and Cryptology. 26:69-79
- Publication Year :
- 2016
- Publisher :
- Korea Institute of Information Security and Cryptology, 2016.
-
Abstract
- Biometric authentication is considered as being an efficient authentication method, since a user is not required to possess or memorize any other information other than biometrics. However, since biometric information is sensitive and could be permanently unavailable in case of revealing that information just once, it is essential to preserve privacy of biometrics. In addition, since noise is inherent in the user of biometric recognition technologies, the biometric authentication needs to handle the noise. Recently, biometric authentication protocols using fuzzy extractor have been actively researched, but the fuzzy extractor-based authentication has a problem that a user should memorize an additional information, called helper data, to deal with their noisy biometric information. In this paper, we propose a novel biometric authentication protocol using Hidden Vector Key Encapsulation Mechanism(HV-KEM) which is one of functional encryption schemes. A primary advantage of our protocol is that a user does not need to possess or memorize any additional information. We propose security requirements of HV-KEM necessary for constructing biometric authentication protocols, and analyze our proposed protocol in terms of correctness, security, and efficiency.
- Subjects :
- Challenge-Handshake Authentication Protocol
Authentication
Biometrics
Computer science
Data_MISCELLANEOUS
020206 networking & telecommunications
02 engineering and technology
Multi-factor authentication
Computer security
computer.software_genre
020204 information systems
Authentication protocol
Lightweight Extensible Authentication Protocol
0202 electrical engineering, electronic engineering, information engineering
Key encapsulation
computer
Functional encryption
Subjects
Details
- ISSN :
- 15983986
- Volume :
- 26
- Database :
- OpenAIRE
- Journal :
- Journal of the Korea Institute of Information Security and Cryptology
- Accession number :
- edsair.doi...........d596298ab06252a3b119d4b86836fbea
- Full Text :
- https://doi.org/10.13089/jkiisc.2016.26.1.69