skip to main content
10.1145/2897845.2897854acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication

Published: 30 May 2016 Publication History

Abstract

The anonymous password authentication scheme proposed in ACSAC'10 under an unorthodox approach of password wrapped credentials advanced anonymous password authentication to be a practically ready primitive, and it is being standardized. In this paper, we improve on that scheme by proposing a new method of "public key suppression" for achieving server-designated credential verifiability, a core technicality in materializing the concept of password wrapped credential. Besides better performance, our new method simplifies the configuration of the authentication server, rendering the resulting scheme even more practical. Further, we extend the idea of password wrapped credential to biometric wrapped credential}, to achieve anonymous biometric authentication. As expected, biometric wrapped credentials help break the linear server-side computation barrier intrinsic in the standard setting of biometric authentication. Experimental results validate the feasibility of realizing efficient anonymous biometric authentication.

References

[1]
M. Abdalla, M. Izabachene, and D. Pointcheval.Anonymous and transparent gateway-based password-authenticated key exchange. In Proc. International Conference on Cryptology and Network Security - CANS'08, pp. 133--148, 2008.
[2]
M.H. Au, W. Susilo, and Y. Mu. Constant-size dynamic k-TAA. In Proc. Security and Cryptography for Networks -SCN'06, LNCS 4116, pp. 111--125, 2006.
[3]
X. Boyen. Reusable cryptographic fuzzy extractors. In Proc. ACM Conference on Computer and Communications Security - CCS'04, pp. 82--91, 2004.
[4]
X. Boyen. A tapestry of identity-based encryption:practice frameworks compared. International Journal on Applied Cryptography, Vol 1(1), pp. 3--21, 2008.
[5]
E. Bresson, O. Chevassut, and D. Pointcheval. Security proofs for an efficient password-based key exchange. In Proc. ACM Conference on Computer and Communication Security - CCS'03, pp.241--250, 2003.
[6]
X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A.Smith. Secure remote authentication using biometrics. In Proc.Advances in Cryptology - Eurocrypt'05, pp. 147--163, 2005.
[7]
M. Blanton and M.P. Hudelson. Biometric-Based Non-transferable Anonymous Credentials. In Proc. Internation Conference on information and Communications Security, ICICS'09, LNCS 5927, pp. 165--180, 2009.
[8]
S. Bellovin and M. Merritt. Encrypted key exchange: password-based protocols secure against dictionary attacks. In Proc. IEEE Symposium on Research in Security and Privacy - S&P'92, pp. 72--84, 1992.
[9]
V. Boyko, P. Mackenzie, and S. Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In Proc. Advances in Cryptology - Eurocrypt'00, LNCS 1807, pp. 156--171,2000.
[10]
J. Camenisch, etc. How to win the clonewars: efficient periodic n-times anonymous authentication. In Proc. ACM Conference on Computer and Communication Security - CCS'06, pp. 201--210, 2006.
[11]
S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F.Scotti. Privacy-aware biometrics: design and implementation of a multimodal verification system. In Proc. 24th Annual Computer Security Applications Conference - ACSAC'08, pp. 130--139, 2008.
[12]
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk,and T. Toft. Privacy-preserving face recognition. In Proc.International Symposium on Privacy Enhancing Technologies, 2009.
[13]
K. Emura, A. Miyaji, and K. Omote. An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation. In Proc. 4th International Conference on Provable Security, ProvSec'10, pp. 184--198, 2010.
[14]
L. Gong, M. Lomas, R. Needham, and J. Saltzer. Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications, Vol. 11(5), pp.648--656, 1993.
[15]
V. Guruswami and M. Sudan. Improved decoding of Reed-Solomon and algebraic-geometry codes. IEEE Transactions on Information Theory, Vol. 45(6), pp. 1757--1767, 1999.
[16]
S. Halevi and H. Krawczyk. Public-key cryptography and password protocols. In Proc. ACM Conference on Computer and Communication Security - CCS'98, pp. 122--131, 1998.
[17]
D. Hoover and B. Kausik. Software smart cards via cryptographic camouflage. In Proc. IEEE Symposium on Security and Privacy, S&P'99, pp. 02-08, 1999.
[18]
Y. Huang, L. Malka, D. Evans, and J. Katz. Efficient privacy-preserving biometric identification. In Proc.Network and Distributed System Security Symposium - NDSS'11, 2011.
[19]
ISO/IEC 20009 (Working Draft): Information technology - Security techniques - Anonymous entity authentication - Part 4: Mechanisms based on weak secrets. http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=64288.
[20]
A. Juels and M. Sudan. A fuzzy vault scheme. In Proc. IEEE International Symposium on Information Theory, 2002.
[21]
S. Jeyaraman and U. Topkara. Have the cake and eat it too - infusing usability into text-password based authentication systems. In Proc. 21st Annual Computer Security Applications Conference - ACSAC'05, pp. 473--482, 2005.
[22]
A. Juels and M. Wattenberg. A fuzzy commitment scheme. In Proc. ACM Conference on Computer and Communications Security - CCS'99, pp. 28--36, 1999.
[23]
M.M. King. Robus passwords. In Proc. 7th Annual Computer Security Applications Conference - ACSAC'91, pp. 239--243, 1991.
[24]
H.Y. Lin and W.G. Tzeng. Anonymous password based authenticated key exchange with bub-linear communication. Journal of Information Science and Engineering,Vol. 25(3), pp. 907--920, 2009.
[25]
A. Miyaji, M. Nakabayashi, and S. Takano. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,2001.
[26]
D. Maio, D. Maltoni, J.L. Wayman, and A.K. Jain. FVC2002: second fingerprint verification competition. In Proc. Internation Conference on Pattern Recognition, pp. 811--814, 2002.
[27]
L. Nguyen. Accumulators from bilinear pairings and applications. In Proc. CT-RSA'05, LNCS 3376, pp. 275--292, 2005.
[28]
K. Nandakumar, A.K. Jain, and S. Pankanti. Fingerprint-base fuzzy vault: implementation and performance. IEEE Transactions on Information Forensics and Security, Vol. 2(4),pp. 744--757, 2007.
[29]
M. Osadchy, B. Pinkas, A. Jarrous, and B. Moskovich. SCiFI: A system for secure face identification. In Proc. IEEE Symposium on Security and Privacy - S&P'10, pp. 239--254,2010.
[30]
H.F Qian, J.Q Gong, and Y. Zhou. Anonymous password-based key exchange with low resources consumption and better user-friendliness. Security and Communication Networks,Vol. 5(12), pp. 1379--1393, Wiley, 2012.
[31]
W.J. Scheirer and T.E. Boult. Cracking fuzzy vaults and biometric encryption. In Proc. IEEE Biometrics Symposium, pp. 1--6, 2007.
[32]
W.J. Scheirer and T.E. Boult. Bipartite biotokens: definition, implementation, and analysis. In Proc. 3rdIAPR/IEEE International Conference on Biometrics - ICB'09, pp.775--785, 2009.
[33]
W.J. Scheirer, W. Bishop, and T.E. Boult. BeyondPKI: the biocryptographic key infrastructure. Security and Privacy in Biometrics, pp. 45--68, Springer-Verlag, 2013.
[34]
S. Shin, K. Kobara, and H. Imai. A secure construction for threshold anonymous password-authenticated key exchange. IEICE Transactions on Fundamentals, E91-A(11):3312--3323, 2008.
[35]
A. Sadeghi, T. Schneider, and I.Wehrenberg. Efficient privacy-preserving face recognition. In Proc. International Conference on Information Security and Cryptology - ICISC'09, pp.229--244, 2009.
[36]
A. Sahai and B. Waters. Fuzzy identity-based encryption. In Proc. Advances in Cryptology - EUROCRYPT'05, LNCS3494, pp 457--473, 2005.
[37]
D. Q. Viet, A. Yamamura, and T. Hidema. Anonymous password-based authenticated key exchange. In Proc. Advances in Cryptology - Indocrypt'05, LNCS 3797, pp. 233--257, 2005.
[38]
C.I. Watson et al. User's Guide to NIST Biometric Image Software (NISB), 2007.
[39]
X. Wang, M.H. Heydari, and H. Lin. An intrusion-tolerant password authentication system. In Proc. 19thAnnual Computer Security Applications Conference - ACSAC'03, pp.110--118, 2003.
[40]
J. Yang and Z. Zhang. A new anonymous password-based authenticated key exchange protocol. In Proc. Advances in Cryptology - Indocrypt'08, LNCS 5365, pp. 200--212, 2008.
[41]
Y.J. Yang, J.Y. Zhou, J. Weng, and F. Bao. A new approach for anonymous password authentication. In Proc. 25thAnnual Computer Security Applications Conference - ACSAC'09, pp.199--208, 2009.
[42]
Y.J. Yang, J.Y. Zhou, J.W. Wong, and F. Bao. Towards practical anonymous password authentication. In Proc. 26th Annual Computer Security Applications Conference - ACSAC'10, pp. 59--68,2010.

Cited By

View all

Index Terms

  1. Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
          May 2016
          958 pages
          ISBN:9781450342339
          DOI:10.1145/2897845
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 30 May 2016

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. anonymous biometric authentication
          2. anonymous password authentication
          3. biometric authentication/identification
          4. public key suppression
          5. standardization

          Qualifiers

          • Research-article

          Conference

          ASIA CCS '16
          Sponsor:

          Acceptance Rates

          ASIA CCS '16 Paper Acceptance Rate 73 of 350 submissions, 21%;
          Overall Acceptance Rate 418 of 2,322 submissions, 18%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)15
          • Downloads (Last 6 weeks)3
          Reflects downloads up to 06 Jan 2025

          Other Metrics

          Citations

          Cited By

          View all

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media