An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2016-10-28

AUTHORS

Aysajan Abidin , Enrique Argones Rúa , Bart Preneel

ABSTRACT

User authentication based on biometrics is getting an increasing attention. However, privacy concerns for biometric data have impeded the adoption of cloud-based services for biometric authentication. This paper proposes an efficient distributed two-factor authentication protocol that is privacy-preserving even in the presence of colluding internal adversaries. One of the authentication factors in our protocol is biometrics, and the other factor can be either knowledge-based or possession-based. The actors involved in our protocol are users, user/client devices with biometric sensors, service provider, and cloud for storing protected biometric templates. Contrary to the existing biometric authentication protocols that offer security only in the honest-but-curious adversarial model, our protocol provides enhanced security and privacy properties in the active (or malicious) adversarial model. Specifically, our protocol offers identity privacy, unlinkability, and user data (i.e., the biometric template data and the second factor) privacy against compromised cloud storage service, and preserves the privacy of the user data even if the cloud storage service colludes with the service provider. Moreover, our protocol only employs lightweight schemes and thus is efficient. The distributed model combined with the security and privacy properties of our protocol paves the way towards a new cloud-based business model for privacy-preserving authentication. More... »

PAGES

335-349

Book

TITLE

Cryptology and Network Security

ISBN

978-3-319-48964-3
978-3-319-48965-0

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-48965-0_20

DOI

http://dx.doi.org/10.1007/978-3-319-48965-0_20

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1084903109


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "ESAT/COSIC, KU Leuven and iMinds, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "ESAT/COSIC, KU Leuven and iMinds, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Abidin", 
        "givenName": "Aysajan", 
        "id": "sg:person.012154455115.82", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012154455115.82"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "ESAT/COSIC, KU Leuven and iMinds, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "ESAT/COSIC, KU Leuven and iMinds, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "R\u00faa", 
        "givenName": "Enrique Argones", 
        "id": "sg:person.014735342260.08", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014735342260.08"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "ESAT/COSIC, KU Leuven and iMinds, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "ESAT/COSIC, KU Leuven and iMinds, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2016-10-28", 
    "datePublishedReg": "2016-10-28", 
    "description": "User authentication based on biometrics is getting an increasing attention. However, privacy concerns for biometric data have impeded the adoption of cloud-based services for biometric authentication. This paper proposes an efficient distributed two-factor authentication protocol that is privacy-preserving even in the presence of colluding internal adversaries. One of the authentication factors in our protocol is biometrics, and the other factor can be either knowledge-based or possession-based. The actors involved in our protocol are users, user/client devices with biometric sensors, service provider, and cloud for storing protected biometric templates. Contrary to the existing biometric authentication protocols that offer security only in the honest-but-curious adversarial model, our protocol provides enhanced security and privacy properties in the active (or malicious) adversarial model. Specifically, our protocol offers identity privacy, unlinkability, and user data (i.e., the biometric template data and the second factor) privacy against compromised cloud storage service, and preserves the privacy of the user data even if the cloud storage service colludes with the service provider. Moreover, our protocol only employs lightweight schemes and thus is efficient. The distributed model combined with the security and privacy properties of our protocol paves the way towards a new cloud-based business model for privacy-preserving authentication.", 
    "editor": [
      {
        "familyName": "Foresti", 
        "givenName": "Sara", 
        "type": "Person"
      }, 
      {
        "familyName": "Persiano", 
        "givenName": "Giuseppe", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-48965-0_20", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-319-48964-3", 
        "978-3-319-48965-0"
      ], 
      "name": "Cryptology and Network Security", 
      "type": "Book"
    }, 
    "keywords": [
      "authentication protocol", 
      "privacy properties", 
      "adversarial model", 
      "two-factor authentication protocol", 
      "cloud-based business model", 
      "service providers", 
      "biometric authentication protocol", 
      "curious adversarial model", 
      "privacy-preserving authentication", 
      "user data privacy", 
      "cloud storage services", 
      "cloud-based services", 
      "entity authentication protocol", 
      "identity privacy", 
      "user authentication", 
      "authentication factors", 
      "client devices", 
      "biometric templates", 
      "data privacy", 
      "storage services", 
      "biometric authentication", 
      "user data", 
      "enhanced security", 
      "privacy concerns", 
      "lightweight scheme", 
      "internal adversaries", 
      "biometric sensors", 
      "biometric data", 
      "authentication", 
      "privacy", 
      "security", 
      "business models", 
      "biometrics", 
      "services", 
      "unlinkability", 
      "protocol", 
      "adversary", 
      "users", 
      "providers", 
      "cloud", 
      "collude", 
      "scheme", 
      "model", 
      "sensors", 
      "adoption", 
      "data", 
      "devices", 
      "way", 
      "template", 
      "actors", 
      "attention", 
      "concern", 
      "properties", 
      "factors", 
      "presence", 
      "paper"
    ], 
    "name": "An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties", 
    "pagination": "335-349", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1084903109"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-48965-0_20"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-48965-0_20", 
      "https://app.dimensions.ai/details/publication/pub.1084903109"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T06:59", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_453.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-48965-0_20"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-48965-0_20'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-48965-0_20'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-48965-0_20'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-48965-0_20'


 

This table displays all metadata directly associated to this object as RDF triples.

134 TRIPLES      22 PREDICATES      80 URIs      73 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-48965-0_20 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N46e1fc7f51904f758551ab28e836503b
4 schema:datePublished 2016-10-28
5 schema:datePublishedReg 2016-10-28
6 schema:description User authentication based on biometrics is getting an increasing attention. However, privacy concerns for biometric data have impeded the adoption of cloud-based services for biometric authentication. This paper proposes an efficient distributed two-factor authentication protocol that is privacy-preserving even in the presence of colluding internal adversaries. One of the authentication factors in our protocol is biometrics, and the other factor can be either knowledge-based or possession-based. The actors involved in our protocol are users, user/client devices with biometric sensors, service provider, and cloud for storing protected biometric templates. Contrary to the existing biometric authentication protocols that offer security only in the honest-but-curious adversarial model, our protocol provides enhanced security and privacy properties in the active (or malicious) adversarial model. Specifically, our protocol offers identity privacy, unlinkability, and user data (i.e., the biometric template data and the second factor) privacy against compromised cloud storage service, and preserves the privacy of the user data even if the cloud storage service colludes with the service provider. Moreover, our protocol only employs lightweight schemes and thus is efficient. The distributed model combined with the security and privacy properties of our protocol paves the way towards a new cloud-based business model for privacy-preserving authentication.
7 schema:editor N14fa00ecb7084f11b97249d3d4e1dba2
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf Nd751c76b3e4a49ecac67090f4b209fe1
11 schema:keywords actors
12 adoption
13 adversarial model
14 adversary
15 attention
16 authentication
17 authentication factors
18 authentication protocol
19 biometric authentication
20 biometric authentication protocol
21 biometric data
22 biometric sensors
23 biometric templates
24 biometrics
25 business models
26 client devices
27 cloud
28 cloud storage services
29 cloud-based business model
30 cloud-based services
31 collude
32 concern
33 curious adversarial model
34 data
35 data privacy
36 devices
37 enhanced security
38 entity authentication protocol
39 factors
40 identity privacy
41 internal adversaries
42 lightweight scheme
43 model
44 paper
45 presence
46 privacy
47 privacy concerns
48 privacy properties
49 privacy-preserving authentication
50 properties
51 protocol
52 providers
53 scheme
54 security
55 sensors
56 service providers
57 services
58 storage services
59 template
60 two-factor authentication protocol
61 unlinkability
62 user authentication
63 user data
64 user data privacy
65 users
66 way
67 schema:name An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties
68 schema:pagination 335-349
69 schema:productId N8b7073bc3b6d469fa25e2b5bbe276269
70 N93b82e8ecead4ec5ac1d53456ae4f61c
71 schema:publisher Nb4c4eebc465a484eaba6e021f753dee9
72 schema:sameAs https://app.dimensions.ai/details/publication/pub.1084903109
73 https://doi.org/10.1007/978-3-319-48965-0_20
74 schema:sdDatePublished 2022-10-01T06:59
75 schema:sdLicense https://scigraph.springernature.com/explorer/license/
76 schema:sdPublisher N4b93a86be8964bbb92a94c379151b8ca
77 schema:url https://doi.org/10.1007/978-3-319-48965-0_20
78 sgo:license sg:explorer/license/
79 sgo:sdDataset chapters
80 rdf:type schema:Chapter
81 N14fa00ecb7084f11b97249d3d4e1dba2 rdf:first Na463ac91f9cf421da44a4fed5886c7df
82 rdf:rest N62ba74cb61114ba78729ed6f42998f1e
83 N46e1fc7f51904f758551ab28e836503b rdf:first sg:person.012154455115.82
84 rdf:rest N57e058520a3f4c5798a3cfbcf4fab5f6
85 N4b93a86be8964bbb92a94c379151b8ca schema:name Springer Nature - SN SciGraph project
86 rdf:type schema:Organization
87 N57e058520a3f4c5798a3cfbcf4fab5f6 rdf:first sg:person.014735342260.08
88 rdf:rest Na3b584ec358d468aa6d512a5af57efda
89 N62ba74cb61114ba78729ed6f42998f1e rdf:first Ned4f10ab861d478eb9acb78e3ebfeb9a
90 rdf:rest rdf:nil
91 N8b7073bc3b6d469fa25e2b5bbe276269 schema:name doi
92 schema:value 10.1007/978-3-319-48965-0_20
93 rdf:type schema:PropertyValue
94 N93b82e8ecead4ec5ac1d53456ae4f61c schema:name dimensions_id
95 schema:value pub.1084903109
96 rdf:type schema:PropertyValue
97 Na3b584ec358d468aa6d512a5af57efda rdf:first sg:person.011115044357.39
98 rdf:rest rdf:nil
99 Na463ac91f9cf421da44a4fed5886c7df schema:familyName Foresti
100 schema:givenName Sara
101 rdf:type schema:Person
102 Nb4c4eebc465a484eaba6e021f753dee9 schema:name Springer Nature
103 rdf:type schema:Organisation
104 Nd751c76b3e4a49ecac67090f4b209fe1 schema:isbn 978-3-319-48964-3
105 978-3-319-48965-0
106 schema:name Cryptology and Network Security
107 rdf:type schema:Book
108 Ned4f10ab861d478eb9acb78e3ebfeb9a schema:familyName Persiano
109 schema:givenName Giuseppe
110 rdf:type schema:Person
111 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
112 schema:name Information and Computing Sciences
113 rdf:type schema:DefinedTerm
114 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
115 schema:name Data Format
116 rdf:type schema:DefinedTerm
117 sg:person.011115044357.39 schema:affiliation grid-institutes:grid.5596.f
118 schema:familyName Preneel
119 schema:givenName Bart
120 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
121 rdf:type schema:Person
122 sg:person.012154455115.82 schema:affiliation grid-institutes:grid.5596.f
123 schema:familyName Abidin
124 schema:givenName Aysajan
125 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012154455115.82
126 rdf:type schema:Person
127 sg:person.014735342260.08 schema:affiliation grid-institutes:grid.5596.f
128 schema:familyName Rúa
129 schema:givenName Enrique Argones
130 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014735342260.08
131 rdf:type schema:Person
132 grid-institutes:grid.5596.f schema:alternateName ESAT/COSIC, KU Leuven and iMinds, Leuven, Belgium
133 schema:name ESAT/COSIC, KU Leuven and iMinds, Leuven, Belgium
134 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...