4.7 Article

A Complete User Authentication and Key Agreement Scheme Using Cancelable Biometrics and PUF in Multi-Server Environment

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2021.3128826

Keywords

Performance evaluation; Technological innovation; Privacy; Protocols; Biometrics (access control); Authentication; Physical unclonable function; Cancelable biometrics; privacy preserving; authentication; physical unclonable functions; multi server

Funding

  1. NSFC [61976006, 61902003]
  2. NSF_Anhui (AH) [2108085MF206]

Ask authors/readers for more resources

With the development and popularization of biometrics recognition technology, the protection of biometric data is of utmost importance. A user authentication protocol based on cancelable biometrics and PUF is proposed to ensure robustness, effectiveness, and security through performance and security analysis.
With the current development and popularization of biometrics recognition technology, our biometrics and other identity information may be illegal bulk scalping, and there is the possibility of being used for false enrolment, network fraud and other illegal criminal activities. Although some network platforms based on biometrics recognition adopt multi-identity authentication, network hacking technology is also improving constantly. Therefore, we must not ignore the importance of biometrics data protection. To this end, we propose a complete user authentication protocol and key agreement scheme based on cancelable biometrics and physical unclonable function (PUF). Firstly, cancelable biometrics are generated by efficient biometrics fusion processing which called PUF-TTM (Template Transformation Method) using a PUF embedded into the device. Then based on Biometrics-as-a-Service (BaaS) model and secret sharing technology, a complete authentication protocol in multi-server environment is designed, and the robustness, effectiveness and security of our proposed scheme are ensured from the perspective of performance and security analysis.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available