高级检索
    张 凡 冯登国. 基于模糊提取的远程双向生物认证[J]. 计算机研究与发展, 2009, 46(5): 850-856.
    引用本文: 张 凡 冯登国. 基于模糊提取的远程双向生物认证[J]. 计算机研究与发展, 2009, 46(5): 850-856.
    Zhang Fan and Feng Dengguo. Fuzzy Extractor Based Remote Mutual Biometric Authentication[J]. Journal of Computer Research and Development, 2009, 46(5): 850-856.
    Citation: Zhang Fan and Feng Dengguo. Fuzzy Extractor Based Remote Mutual Biometric Authentication[J]. Journal of Computer Research and Development, 2009, 46(5): 850-856.

    基于模糊提取的远程双向生物认证

    Fuzzy Extractor Based Remote Mutual Biometric Authentication

    • 摘要: 传统的远程生物认证采用安全信道或者生物认证过程本地化的方法,具有较多的局限性.模糊提取可从生物特征输入中以容错的方式可靠地提取出均匀分布的随机密钥,当输入发生变化且变化很小时,该密钥保持不变.基于这一重要工具,给出了一个零存储的非安全信道双向生物认证方案.该方案无需存储和传输用户的生物特征,有效保护了用户隐私,并能够抵抗假冒攻击和多服务器合谋攻击.此外,所给方案还具有良好的可扩展性,集成口令和智能卡可产生多因素认证方案,并支持用户注册更新.

       

      Abstract: Biometric authentication eliminates the need for passwords, PIN numbers, and other ID’s that are readily compromised. Meanwhile, the network environment provides biometric authentication with more application scenarios. However, too many confines exist in the traditional remote biometric authentication in which the secure channel or localization of biometric authentication process is applied. Fuzzy extractors allow one to extract some uniformly distributed random key in an error-tolerant way from biometric input w and then successfully reproduce the key from any other biometric input w’ that is very close to w. Based on the important secure primitive, a zero-storage mutual biometric authentication scheme on non-secure channel is presented in this paper. A two-party key distribution protocol based on sharing secret is used. Biometric samples are utilized to reproduce the sharing key. With no need of storing and transferring user biometrics, user privacy can be well protected. Additionally, it is pointed out that the proposed scheme is invulnerable to masquerade attacks from both users and servers. Conspiracy attacks from multi-server can also be resisted. Furthermore, the proposed scheme is very scalable. Multi-factor authentication schemes can be generated by integrating password with smartcard. User registration update can also be easily achieved. And the scheme is suitable for applications with high security requirement.

       

    /

    返回文章
    返回