基于格的抗伪造终端攻击远程生物认证方案Lattice based remote biometric authentication secure against fake terminal attacks
于斌,郝云芳
摘要(Abstract):
给出一个抗伪造终端攻击安全的远程生物认证方案。基于格密码学,建立抗伪造终端攻击的远程生物认证安全模型,并定义伪造终端攻击和抗该攻击的安全性。将格的公共参数存储在服务器端,通过验证远程终端是否能使用正确的格陷门信息,服务器能够有效鉴别远程终端是否合法终端,从而避免伪造终端攻击。仿真结果表明:方案运行时间短,运行效率较高;安全性分析表明:在格困难问题不存在有效算法的假设下,该方案具有抗伪造终端攻击安全性。
关键词(KeyWords): 生物认证;基于格密码学;伪造终端攻击;陷门信息
基金项目(Foundation):
作者(Author): 于斌,郝云芳
DOI: 10.13682/j.issn.2095-6533.2016.02.016
参考文献(References):
- [1]BRINGER J,CHABANNE H,I ZABACHENE M,et al.An application of the goldwasser-micali cryptosystem to biometric authentication.[C]//The Proceedings of the 8th Australasian Conference on Information Security and Privacy,Townsville,Australia:Springer Berlin Heidelberg,2007:96-106.DOI:10.1007/978-3-540-73458-1_8.
- [2]YEVGENIY D,LEONID R,ADAN S.Fuzzy extractors:How to generate strong keys from biometrics and other noisy data[C]//The Proceedings of Eurocrypt’04,Interlaken,Switzerland:Springer Berlin Heidelberg,2004:523-540.DOI:10.1007/978-3-540-24676-3_31
- [3]STOIANOV A.Cryptographically secure biometric[C]//The Proceedings of SPIE Biometric Technology for Human Identification,Orlando,Florida,United States:SPIE,2010:7667.DOI:10.1117/12.849028.
- [4]YAGIZ S,LI Q,and NASIR M.Protecting biometric templates with sketch:Theory and practice[J].IEEE Transaction on Information Forensics and Security,2007(2):503-512.DOI:10.1109/TIFS.2007.902022.
- [5]VALERIE V T,HERVE S,JEREMYL,et al.Biometric fuzzy extractors made practical:A proposal based on finger codes.[C]//The Proceedings of International Conference on Biometrics,Seoul,Korea:Springer Berlin Heidelberg,2007:604-613.DOI:10.1007/978-3-540-74549-5_64.
- [6]张凡,冯登国.基于模糊提取的远程双向生物认证[J].计算机研究与发展,2009(46):850-856.
- [7]BRINGER J,CHHABANNE H,POINTCHEVAL D,et al.Extended private information retrieval and its application in biometrics authentications[C]//The Proceedings of The 10th International Conference on Cryptology and Network Security,Singapore:Springer Berlin Heidelberg,2007:175-193.DOI:10.1007/978-3-540-76969-9_12.
- [8]BRINGER J,CHHABANNE H.An authentication protocol with encrypted biometric data.[C]//The Proceedings of the 1st Conference on Cryptology in Africa,Casablanca,Morocco:Springer Berlin Heidelberg,2008:109-124.DOI:10.1007/978-3-540-68164-9_8.
- [9]TANGQ,BRINGER J,CHHABANNE H,et al.A formal study of the privacy concerns in biometric-based remote authentication schemes[C]//The Proceedings of the 4th International Conference of Information Security Practice and Experience:Springer Berlin Heidelberg 2008:56-70.DOI:10.1007/978-3-540-79104-1_5.
- [10]MICCIANCIO D,REGEV O.Lattice-based cryptography.In:Post Quantum Cryptography[M].Heidelberg:Springer,2009:147-191.
- [11]郑东,赵庆兰,张应辉.密码学综述[J].西安邮电大学学报,2013,18(6):1-10.DOI:10.13682/j.issn.2095-6533.2013.06.017.
- [12]VARDY A.Algorithmic complexity in coding theory and the minimum distance problem[C]//The Proceedings of the 20th Annual ACM Symposium on the Theory of Computing,Texas,USA:ACM,1997:92-109.DOI:10.1145/258533.258559.
- [13]MICCIANCIO D,PEIKERT C.Trapdoors for Lattices:Simpler,Tighter,Faster,Smaller[C]//The Proceedings of Eurocrypt’12,Cambridge,United Kingdom:Springer Berlin Heidelberg,2012:700-718.DOI:10.1007/978-3-642-29011-4_41.
- [14]GENTRY C,PEIKERT C,and VAIKUNTANATHAN V.Trapdoors for Hard Lattices and New Cryptographic Constructions[C]//The Proceedings of the 40th Annual ACM Symposium on the Theory of Computing,British Columbia,Canada:ACM,2008:197-206.DOI:10.1145/1374376.1374407.
- [15]HAVAS G,MAJEWSKI B S.Hermite normal form computation for integer matrices[J].Congressus Numerantium,1994,105:87-96.