Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Extracting randomness: a survey and new constructions
Journal of Computer and System Sciences
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Error-tolerant password recovery
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Session-Key Generation Using Human Passwords Only
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Reusable cryptographic fuzzy extractors
Proceedings of the 11th ACM conference on Computer and communications security
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Provably secure password-authenticated key exchange using Diffie-Hellman
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
A framework for password-based authenticated key exchange
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Forward secrecy in password-only key exchange protocols
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Universally composable password-based key exchange
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
EURASIP Journal on Advances in Signal Processing
Secure Biometric Authentication with Improved Accuracy
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Password Mistyping in Two-Factor-Authenticated Key Exchange
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
An Improved Robust Fuzzy Extractor
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
The best of both worlds: Applying secure sketches to cancelable biometrics
Science of Computer Programming
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
Information Systems Frontiers
Key Agreement from Close Secrets over Unsecured Channels
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
On cryptography with auxiliary input
Proceedings of the forty-first annual ACM symposium on Theory of computing
Bipartite Biotokens: Definition, Implementation, and Analysis
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
A New Approach for Biometric Template Storage and Remote Authentication
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Intrusion-resilient key exchange in the bounded retrieval model
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Biometric digital key mechanisms for telebiometric authentication based on biometric certificate
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
An application of the Goldwasser-Micali cryptosystem to biometric authentication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Biometric digital signature key generation and cryptography communication based on fingerprint
FAW'07 Proceedings of the 1st annual international conference on Frontiers in algorithmics
Extended private information retrieval and its application in biometrics authentications
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
How to build a hash function from any collision-resistant function
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Journal of Network and Computer Applications
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
A formal study of the privacy concerns in biometric-based remote authentication schemes
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
An authentication protocol with encrypted biometric data
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Multi-factor authenticated key exchange
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Privacy amplification with asymptotically optimal entropy loss
Proceedings of the forty-second ACM symposium on Theory of computing
Extending match-on-card to local biometric identification
BioID_MultiComm'09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication
Secure protocols for serverless remote product authentication
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
Secure sketch for multiple secrets
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Biometric identity based signature revisited
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Round-optimal password-based authenticated key exchange
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Fuzzy identity based signature with applications to biometric authentication
Computers and Electrical Engineering
Leftover Hash Lemma, revisited
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Multi-biometrics based crypto-biometric session key generation and sharing protocol
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Wireless Personal Communications: An International Journal
Secure sketch for biometric templates
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
An effective biometric cryptosystem combining fingerprints with error correction codes
Expert Systems with Applications: An International Journal
Robust fuzzy extractors and authenticated key agreement from close secrets
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
A crypto-biometric scheme based on iris-templates with fuzzy extractors
Information Sciences: an International Journal
Biometric-Based non-transferable anonymous credentials
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Generic constructions of biometric identity based encryption systems
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Security analysis of a multi-factor authenticated key exchange protocol
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Feeling is believing: a secure template exchange protocol
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
TCC'13 Proceedings of the 10th theory of cryptography conference on Theory of Cryptography
OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Secure outsourced computation of iris matching
Journal of Computer Security
Hi-index | 0.00 |
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are not uniformly distributed; and (2) they are not exactly reproducible. Recent work, most notably that of Dodis, Reyzin, and Smith, has shown how these obstacles may be overcome by allowing some auxiliary public information to be reliably sent from a server to the human user. Subsequent work of Boyen has shown how to extend these techniques, in the random oracle model, to enable unidirectional authentication from the user to the server without the assumption of a reliable communication channel. We show two efficient techniques enabling the use of biometric data to achieve mutual authentication or authenticated key exchange over a completely insecure (i.e., adversarially controlled) channel. In addition to achieving stronger security guarantees than the work of Boyen, we improve upon his solution in a number of other respects: we tolerate a broader class of errors and, in one case, improve upon the parameters of his solution and give a proof of security in the standard model.