Top Banner
FF0-32D Privacy Preserving Biometric Authentication - Ahbilasha Bhargav-Spantzel - IAP Biometrics Standards, Performance and Assurance Laboratory Privacy Preserving Biometric Authentication E. Bertino 1 , S.J. Elliott 2 , A.Bhargav-Spantzel 1 , A.C.Squicciarini 1 , S. K. Modi 2 1 CERIAS, 2 Department of Industrial Technology. Purdue University Introduction: • One approach to the problem of reducing the threat of identity theft is the widespread adoption of systems using biometrics authentication. • Improper storage and use of identification credentials raises several security and privacy risks. The goal is to provide a privacy preserving methodology for strong biometric authentication in federated identity management systems. Advantages: Privacy Preserving Multifactor Authentication [1]: multifactor authentication is essential for secure authentication mechanisms. The identity management framework is used to provide proofs of multiple strong identifiers for a given user. Interoperability: Our scheme provides an interoperable, usable, secure, and inexpensive to use biometric authentication in a federation. User Control : The raw biometric never leaves the client machine therefore providing complete control to its owner. Primary Tools Used: Secure Sketches: Fuzzy key storage mechanism which allows to recover a secret key w from a faulty reading w’ of w. Zero Knowledge Proof: Interactive method allowing one party to prove to another that a statement is true, without revealing anything other than the veracity of the statement. w s Secure Sketch Module s w’ ~ w Recover Module w Authentication Phases: Registration: The integer commitment corresponding to the recorded biometric template is sent to the registrar. Authentication: The recover module reproduces the originally stored biometric template which is used by the ZKP module to form the correct proofs for authentication Secure Sketch Module w = s ZKP Module w r a ndom r Biometric commitment w’ = s ZKP Module r proofs Recover Module w challenge Reference: [1] A. B. Spantzel, A. C. Squicciarini, E. Bertino. Establishing and Protecting Digital Identity in Federation System. In proceedings of ACM CCS workshop on Digital Identity Management .
1

Privacy Preserving Biometric Authentication

Jan 09, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Privacy Preserving Biometric Authentication

FF0-32D Privacy Preserving Biometric Authentication - Ahbilasha Bhargav-Spantzel - IAP

Biometrics Standards, Performance and Assurance Laboratory

Privacy Preserving Biometric AuthenticationE. Bertino1, S.J. Elliott2, A.Bhargav-Spantzel1, A.C.Squicciarini1 , S. K. Modi2

1CERIAS, 2Department of Industrial Technology. Purdue University

Introduction:

• One approach to the problem of reducing the threat of identity theft is the widespread adoption of systems using biometrics authentication.• Improper storage and use of identification credentials raises several security and privacy risks. • The goal is to provide a privacy preserving methodologyfor strong biometric authentication in federated identity management systems.

Advantages:

• Privacy Preserving Multifactor Authentication [1]:multifactor authentication is essential for secure authentication mechanisms. The identity management framework is used to provide proofs of multiple strong identifiers for a given user.

• Interoperability: Our scheme provides an interoperable, usable, secure, and inexpensive to use biometric authentication in a federation.

•User Control : The raw biometric never leaves the client machine therefore providing complete control to its owner.

Primary Tools Used:

•Secure Sketches: Fuzzy key storage mechanism which allows to recover a secret key w from a faulty reading w’ of w.

• Zero Knowledge Proof: Interactive method allowing one party to prove to another that a statement is true, without revealing anything other than the veracity of the statement.

w sSecure Sketch Module

sw’ ~ w

RecoverModule

w

Authentication Phases:

• Registration: The integer commitment corresponding to the recorded biometric template is sent to the registrar.

• Authentication: The recover module reproduces the originally stored biometric template which is used by the ZKP module to form the correct proofs for authentication

Secure Sketch Module

w =

s

ZKPModule

w random r Biometric commitment

w’ =

s

ZKPModule

r

proofs

RecoverModule

w challenge

Reference:[1] A. B. Spantzel, A. C. Squicciarini, E. Bertino. Establishing and Protecting Digital Identity in Federation System. In proceedings of ACM CCS workshop on Digital Identity Management .