Font Size: a A A

Research On Anonymous Identity Authentication Based On Biometrics

Posted on:2016-12-12Degree:MasterType:Thesis
Country:ChinaCandidate:W LongFull Text:PDF
GTID:2308330467472791Subject:Information security
Abstract/Summary:PDF Full Text Request
Biometric authentication technology as a means of identity authentication, has become more widely used. Such as fingerprint attendance system, etc. Biometric identity authentication system bases on users’biological physiological structure features and behavior patterns for authentication, because these biological characteristics are on the physiology and behavior associated with the user directly, it is difficult to intercept, so compared to the traditional password discriminant method, biometrics is a natural way and more reliable authentication technology. Therefore, compared with the traditional identity authentication system based on password, using the latest biometric identification technology of identity authentication system can provide better security. Biometric signals are immutable and can be closely related to individuals’information, when disclosed its widespread deployment will seriously damage the user’s privacy. The currently existing biometric authentication system still cannot achieve the user’s anonymous authentication.This paper proposes the Anonymous Biometric Identity Authentication (ABIA) system to protect user identity information. Compared with the traditional biological certification system, anonymous system in the realization of authentication security and communication security at the same time can effectively prevent the protocol participants in the process of interaction of identity information leakage, and protect the privacy of users.The system uses a Homomorphic Encryption (HE) technology based on the agreement to protect the user identity information. In order to make the homomorphic encryption protocol can be better applied to large biological characteristics of the database, we propose the k-Anonymous Quantization (kAQ) framework that provides an effective and secure tradeoff of privacy and complexity. kAQ limits server’s knowledge of the user to k maximally dissimilar candidates in the database, where k controls the amount of complexity-privacy tradeoff. kAQ is realized by a constant time table lookup to identity the k candidates followed by a HE-based matching protocol applied only on these candidates. It can effectively reduce the system matching retrieval time under the premise of ensure accuracy and implement the stronger security, user anonymity and the calculation of rational consumption. The experiment extracted by face data proves that under the premise of implementing user anonymity well guarantees the authentication efficiency of the system, the system can effectively protect the user’s private information and reach a target of anonymity. The main contribution of this paper is proposing a strong security anonymous authentication scheme and illustrates a practical implementation of an anonymous biometric identity authentication system. This paper realizes the anonymity of biometric authentication, well protect privacy from both sides of the user and the system. The biological identity information is encrypted based on the homomorphic encryption that makes registration and recognition under the environment of the encryption process. So even if the system is under attack, the original biological information is still safe, it realizes the protection of biometric information effectively.
Keywords/Search Tags:Biological characteristic, Identity authentication, Anonymity, Face
PDF Full Text Request
Related items