4
Blind authentication protocol provides secure and blind biometric authentication protocol, which addresses the concerns of user's privacy, template protection, and trust issues. The protocol is blind in the sense that it reveals only the identity, and no additional information about the user or the biometric to the authenticating server or vice-versa. As the protocol is based on asymmetric encryption of the biometric data, it captures the advantages of biometric authentication as well as the security of public key cryptography. The authentication protocol can run over public networks and provide nonrepudiable identity verification. The encryption also provides template protection, the ability to revoke enrolled templates, and alleviates the concerns on privacy in widespread use of biometrics. The proposed approach makes no restrictive assumptions on the biometric data and is hence

Blind Authentication Protocol Provides Secure and Blind Biometric Authentication Protocol (1)

Embed Size (px)

Citation preview

Page 1: Blind Authentication Protocol Provides Secure and Blind Biometric Authentication Protocol (1)

Blind authentication protocol provides secure and

blind biometric authentication protocol, which addresses

the concerns of user's privacy, template protection, and

trust issues. The protocol is blind in the sense that it

reveals only the identity, and no additional information

about the user or the biometric to the authenticating

server or vice-versa. As the protocol is based on

asymmetric encryption of the biometric data, it captures

the advantages of biometric authentication as well as the

security of public key cryptography. The authentication

protocol can run over public networks and provide

nonrepudiable identity verification. The encryption also

provides template protection, the ability to revoke

enrolled templates, and alleviates the concerns on

privacy in widespread use of biometrics. The proposed

approach makes no restrictive assumptions on the

biometric data and is hence applicable to multiple

biometrics. Such a protocol has significant advantages

over existing biometric cryptosystems, which use a

biometric to secure a secret key, which in turn is used for

authentication. We analyze the security of the protocol

under various attack scenarios. Experimental results on

four biometric datasets (face, iris, hand geometry, and

Page 2: Blind Authentication Protocol Provides Secure and Blind Biometric Authentication Protocol (1)

fingerprint) show that carrying out the authentication in

the encrypted domain does not affect the accuracy, while

the encryption key acts as an additional layer of security.

Some biometric systems permit more than one attempt to identify or verify an individual.Some biometric features are persistent over time while others change. All biometric features are deemed ‘unique’ but some are less ‘distinct’ than others and thus less useful for automated identification purposes. The distinctiveness of any biometric feature depends also on the effectiveness of the sampling technique used to measure it, as well as the efficiency of the matching process used to declare a ‘match’ between two samples. Biometric identification is a technique that uses biometric features to identify human beings. Biometrics are used to strongly link a stored identity to the physical person this represents. Since a person’s biometric features are a part of his or her body, they will always be with that person where ever he/she goes and available to prove his or her identity. Biometric technologies may be used in three ways: (a) to verify that people are who they claim to be, (b) to discover the identity of unknown people, and (c) to screen people against a watch-list. Jain A. states that the evaluation whether a particular body characteristic is suitable for biometric use can be done on the following seven criteria 11 identified by the author as being the seven pillars of Biometric Wisdom:Universality. All human beings are endowed with the same physical characteristics - such as fingers, iris, face, DNA – which can be used for identification.Distinctiveness. For each person these

Page 3: Blind Authentication Protocol Provides Secure and Blind Biometric Authentication Protocol (1)

characteristics are unique, and thus constitute a distinguishing feature.Permanence. These characteristics remain largely unchanged throughout a person's life.Collect ability. A person's unique physical characteristics need to be collected in a reasonably easy fashion for quick identification.Performance. The degree of accuracy of identification must be quite high before the system can be operational.Acceptability. Applications will not be successful if the public offers strong and continuous resistance to biometrics.Resistance to Circumvention.