{"title":"BIAS: A novel secure and efficient biometric-based anonymous authentication scheme","authors":"","doi":"10.1016/j.comnet.2024.110754","DOIUrl":null,"url":null,"abstract":"<div><p>Currently, biometric-based authentication schemes are widely adopted in the field of online payments. Consequently, this has led to an increasing number of people becoming concerned about the privacy-preservation of their biometric data. Gunasinghe et al. presented PrivBioMTAuth, a solution for mobile phone biometric-based authentication designed to protect users’ privacy. However, the solution has drawbacks, such as its impact on the execution efficiency of the authentication protocol or its vulnerability to man-in-the-middle attacks during the authentication phase. Moreover, the user’s biometric image and the password must be revealed to the identity provider, which may raise security concerns. In this work, we present a novel secure and efficient biometric-based anonymous authentication solution with fully succinct verification and significantly lower storage and communication overhead. Different from PrivBioMTAuth, we rely on the NIZK argument given in Groth’s work to reduce the size of the anonymous identity and simplify the verification complexity. In addition, we design a high-performance protocol for conducting large-scale verification of the user’s anonymous identities. We propose an optimized multi-exponentiation argument based on Bayer et al.’s work and utilize it to ensure that a semi-trusted identity provider who seeks to access the users’ sensitive biometric information can faithfully execute the users’ identity registration protocol. The experiment results show that our proposed scheme is efficient and has privacy-preserving capabilities, and it can be applied in the resource-constrained devices.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4000,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128624005863","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
Currently, biometric-based authentication schemes are widely adopted in the field of online payments. Consequently, this has led to an increasing number of people becoming concerned about the privacy-preservation of their biometric data. Gunasinghe et al. presented PrivBioMTAuth, a solution for mobile phone biometric-based authentication designed to protect users’ privacy. However, the solution has drawbacks, such as its impact on the execution efficiency of the authentication protocol or its vulnerability to man-in-the-middle attacks during the authentication phase. Moreover, the user’s biometric image and the password must be revealed to the identity provider, which may raise security concerns. In this work, we present a novel secure and efficient biometric-based anonymous authentication solution with fully succinct verification and significantly lower storage and communication overhead. Different from PrivBioMTAuth, we rely on the NIZK argument given in Groth’s work to reduce the size of the anonymous identity and simplify the verification complexity. In addition, we design a high-performance protocol for conducting large-scale verification of the user’s anonymous identities. We propose an optimized multi-exponentiation argument based on Bayer et al.’s work and utilize it to ensure that a semi-trusted identity provider who seeks to access the users’ sensitive biometric information can faithfully execute the users’ identity registration protocol. The experiment results show that our proposed scheme is efficient and has privacy-preserving capabilities, and it can be applied in the resource-constrained devices.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.