Secure smartcardbased fingerprint authentication

T. Charles, Clancy, N. Kiyavash, D. Lin
{"title":"Secure smartcardbased fingerprint authentication","authors":"T. Charles, Clancy, N. Kiyavash, D. Lin","doi":"10.1145/982507.982516","DOIUrl":null,"url":null,"abstract":"In this paper, the fundamental insecurities hampering a scalable, wide-spread deployment of biometric authentication are examined, and a cryptosystem capable of using fingerprint data as its key is presented. For our application, we focus on situations where a private key stored on a smartcard is used for authentication in a networked environment, and we assume an attacker can launch o -line attacks against a stolen card.Juels and Sudan's <i>fuzzy vault</i> is used as a starting point for building and analyzing a secure authentication scheme using fingerprints and smartcards called a <i>figerprint vault</i>. Fingerprint minutiae coordinates <i>m<sub>i</sub></i> are encoded as elements in a nite eld <i>F</i> and the secret key is encoded in a polynomial <i>f(x)</i> over <i>F</i>[<i>x</i>]. The polynomial is evaluated at the minutiae locations, and the pairs (<i>m<sub>i</sub>, f(m<sub>i</sub>)</i>) are stored along with random (<i>c<sub>i</sub>, d<sub>i</sub></i>) cha points such that <i>d<sub>i</sub> ≠ f(c<sub>i</sub>)</i>. Given a matching fingerprint, a valid user can seperate out enough true points from the cha points to reconstruct <i>f(x)</i>, and hence the original secret key.The parameters of the vault are selected such that the attacker's vault unlocking complexity is maximized, subject to zero unlocking complexity with a matching fingerprint and a reasonable amount of error. For a feature location measurement variance of 9 pixels, the optimal vault is 2<sup>69</sup> times more difficult to unlock for an attacker compared to a user posessing a matching fingerprint, along with approximately a 30% chance of unlocking failure.","PeriodicalId":228135,"journal":{"name":"Workshop Brasileira em Métodos Agile / Brazilian Workshop on Agile Methods","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"446","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Workshop Brasileira em Métodos Agile / Brazilian Workshop on Agile Methods","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/982507.982516","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 446

Abstract

In this paper, the fundamental insecurities hampering a scalable, wide-spread deployment of biometric authentication are examined, and a cryptosystem capable of using fingerprint data as its key is presented. For our application, we focus on situations where a private key stored on a smartcard is used for authentication in a networked environment, and we assume an attacker can launch o -line attacks against a stolen card.Juels and Sudan's fuzzy vault is used as a starting point for building and analyzing a secure authentication scheme using fingerprints and smartcards called a figerprint vault. Fingerprint minutiae coordinates mi are encoded as elements in a nite eld F and the secret key is encoded in a polynomial f(x) over F[x]. The polynomial is evaluated at the minutiae locations, and the pairs (mi, f(mi)) are stored along with random (ci, di) cha points such that di ≠ f(ci). Given a matching fingerprint, a valid user can seperate out enough true points from the cha points to reconstruct f(x), and hence the original secret key.The parameters of the vault are selected such that the attacker's vault unlocking complexity is maximized, subject to zero unlocking complexity with a matching fingerprint and a reasonable amount of error. For a feature location measurement variance of 9 pixels, the optimal vault is 269 times more difficult to unlock for an attacker compared to a user posessing a matching fingerprint, along with approximately a 30% chance of unlocking failure.
安全的智能卡指纹认证
在本文中,研究了阻碍可扩展、广泛部署的生物特征认证的基本不安全因素,并提出了一种能够使用指纹数据作为密钥的密码系统。对于我们的应用程序,我们关注的是在网络环境中使用存储在智能卡上的私钥进行身份验证的情况,并且我们假设攻击者可以对被盗的卡发起零线攻击。Juels和Sudan的模糊保险库被用作构建和分析一种使用指纹和智能卡的安全认证方案的起点,这种方案被称为指纹保险库。指纹细节坐标mi被编码为黑域F中的元素,密钥被编码为多项式F (x) / F[x]。多项式在分点位置求值,对(mi, f(mi))与随机(ci, di) cha点一起存储,使得di≠f(ci)。给定一个匹配的指纹,一个有效的用户可以从cha点中分离出足够的真点来重建f(x),从而重建原始密钥。选择保险库的参数,使攻击者的保险库解锁复杂度最大化,在具有匹配指纹和合理错误量的情况下,解锁复杂度为零。对于特征位置测量方差为9像素的情况,与拥有匹配指纹的用户相比,攻击者解锁最佳保险库的难度要高269倍,并且解锁失败的几率约为30%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信