Biometric Authentication Protocols (BAP s) have increasingly been employed to guarantee reliable access control to places and services. However, it is well-known that biometric traits contain sensitive information of individuals and if compromised could lead to serious security and privacy breaches. Yasuda et al. [23] proposed a distributed privacy-preserving BAP which Abidin et al. [1] have shown to be vulnerable to biometric template recovery attacks under the presence of a malicious computational server. In this paper, we fix the weaknesses of Yasuda et al.’s BAP and present a detailed instantiation of a distributed privacy-preserving BAP which is resilient against the attack presented in [1]. Our solution employs Backes et al.’s [4] verifiable computation scheme to limit the possible misbehaviours of a malicious computational server.
CITATION STYLE
Pagnin, E., Liu, J., & Mitrokotsa, A. (2018). Revisiting Yasuda et al.’s Biometric authentication protocol: Are you private enough? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11261 LNCS, pp. 161–178). Springer Verlag. https://doi.org/10.1007/978-3-030-02641-7_8
Mendeley helps you to discover research relevant for your work.