Font Size: a A A

Secure Biometric Authentication Based On Homomorphic Encryption Research

Posted on:2016-06-20Degree:MasterType:Thesis
Country:ChinaCandidate:Z F LiuFull Text:PDF
GTID:2308330467479165Subject:Information security
Abstract/Summary:PDF Full Text Request
With the development of network and information technology, biometrics technology has been considerable developed. After entering the information society, biometric identification technology is becoming one of fastest growing and most promising IT civilian technology. Meanwhile, as more and more widespread application of biometrics, people began to notice its security and privacy issues. Therefore, people put forward higher requirements about security biometric identification system.In this paper, we studied and summarized the existing security methods which apply in biometric identification systems, and put forward a new blind authentication scheme. This scheme combines the encryption and biometric identification systems, which address the concerns of user’s privacy, template protection, and trust issues. This protocol is blind in the sense that it reveals only the identity, and no addition information about the user or biometric to the authentication server or vice-versa. As the protocol is based on asymmetric encryption of the biometric data, it captures the advantages of biometric authentication as well as the security of public key cryptography.The authentication protocol can run over public networks, the encryption also provides template protection, the ability to revoke enrolled templates, and alleviates the concerns on privacy in widespread use of biometrics.The proposed approach makes no restrictive assumptions on the biometric data and is hence applicable to multiple biometric. Such a protocol has significant advantages over existing biometric cryptosystems, which use a biometric to secure a secret key, which in turn is used for authentication. This paper analyze the security of the protocol under various attack scenarios, the result shows that our protocol can resist most of the existing types of attacks.Finally, This paper implement the fingerprint blind authentication software program, the frame of the scheme tested by software, experimental results show that the accuracy and efficiency of this authentication scheme can achieve most of civil authentication system’s requirement.
Keywords/Search Tags:Biometrics, Identity authentication, Blind authentication, Homomorphicencryption
PDF Full Text Request
Related items