リプレイ攻撃や不正なサーバによる攻撃に耐性のある 秘匿生体認証方式

この論文をさがす

説明

Biometrics authentication is attracting rising attention. Because biological information used in authentication contains a lot of information, it is more difficult to mount impersonation attack than ID/Password scheme. Since biological information contains more critical information, it is necessary to manage biological information securely. To resolve this issue, template protection schemes were proposed, where template protection schemes make it possible to authenticate users without revealing biological information of template data. Bringer et al. proposed a biometrics authentication scheme with template protection using error correcting code and homomorphic encryption. The scheme considers the difference between two biometric features as an error, where they are the biometrics information in enrollment and authentication process. Furthermore, the scheme uses a XOR homomorphic encryption to encrypt template data and authenticates users without decrypting their biological information. However, the scheme has two problems. One is nothing that is countermeasure against replay attack, and the other is that selecting parameters is restricted because the scheme uses an error correcting code. In this paper, we propose two schemes that have countermeasures against these problem. One scheme prevents replay attack by adding different values for each session to a query, using DiffieHellman key exchange. The other scheme can set parameters more flexibility, by using an additive homomorphic encryption without an error correcting code.

収録刊行物

詳細情報 詳細情報について

  • CRID
    1390290699807722240
  • NII論文ID
    120006414510
  • NII書誌ID
    AA12746425
  • DOI
    10.15002/00014407
  • HANDLE
    10114/13744
  • ISSN
    24321192
  • 本文言語コード
    ja
  • 資料種別
    departmental bulletin paper
  • データソース種別
    • JaLC
    • IRDB
    • CiNii Articles
  • 抄録ライセンスフラグ
    使用可

問題の指摘

ページトップへ