+ All Categories
Home > Engineering > Blind authentication

Blind authentication

Date post: 13-Feb-2017
Category:
Upload: pranjul-mishra
View: 255 times
Download: 3 times
Share this document with a friend
22
A Seminar ON Blind Authentication: A Secure Crypto-Biometric Authentication Protocol OF OF M.C.A. M.C.A. By By Pranjul Mishra (2014024000132) Pranjul Mishra (2014024000132) Under the Guidence of Mr. M.Hasan Department of Computer Science and Engineering Madan Mohan Malaviya University of Technology Session(2015-16)
Transcript
Page 1: Blind authentication

A Seminar ON

Blind Authentication: A Secure Crypto-Biometric Authentication Protocol

OFOFM.C.A.M.C.A. ByBy

Pranjul Mishra (2014024000132)Pranjul Mishra (2014024000132)

Under the Guidence of

Mr. M.HasanDepartment of Computer Science and EngineeringMadan Mohan Malaviya University of Technology Session(2015-16)

Page 2: Blind authentication

CONTENTS1. Biometrics2. Biometric Authentication System3. Different types of biometric systems4. Privacy concerns in Biometric authentication systems5. What is Blind Authentication ?6. Features of Blind Authentication7. Previous work8. Security, Privacy and Trust9. Blind Secure Product Protocol10. Advantages11. Conclusion12. References

Page 3: Blind authentication

BIOMETRICS

A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that can be used for identification or verification of identity.

Page 4: Blind authentication

Biometric Authentication System

Page 5: Blind authentication

Different type of biometric systems

Page 6: Blind authentication

Primary Concerns in a Biometric authentication System

1. Template Protection

2. User's privacy

3. Network security

Page 7: Blind authentication

What is Blind Authentication?

A blind authentication protocol that means it reveals only the identity , and no other additional information to the user and the authenticating server.

Page 8: Blind authentication

Key point of Blind Authentication

Use of cryptography primitives to bolster the authenticating process

Encryption provides protection and ability to revoke enrolled templates,

Reduced the concern on privacy

Page 9: Blind authentication

PREVIOUS WORK

Categorization of template protection schemes by Jain

Page 10: Blind authentication

SALTINGInvertible function defined by a key or passwordDue to compromise Easy to revoke and replace with new keyNo longer secure

NON-INVERTIBLE TRANSFORMApply non-invertible function on the biometric templateKey must be available at the time of transformationEg. Robust hashing etc.

KEY BINDING AND KEY GENERATIONComputationally to decode the key or the templateIt is hard to develop scheme for generate a same key for different templates of same person.

Page 11: Blind authentication

Process of blind Authentication

1.Feature extraction2.Enrollment3.Authentication

Page 12: Blind authentication

ENROLLMENT

Page 13: Blind authentication

ALGORITHM ENROLLMENT

1: Client collects multiple sample of her biometric, B1..k2: Feature vectors, xi, are computed from each sample3: Client sends xi, along with her identity and public key E, to the enrollment server4: Enrollment server uses xi and the information from otherusers to compute an authenticating classifier (ω, τ) for the user5: The classifier parameters are encrypted using the users public key: E(ωi)6: E(ωi)s, along with the user’s identity, the encryption key (E), and the threshold (τ), are sent to the authentication server for registration7: The client is then notified about success

Page 14: Blind authentication

AUTHENTICATION

Blind Authentication Process: the identity vectors x, w or the intermediate results xi · wi is revealed to anyone.

Page 15: Blind authentication

Features of blind authentication

SYSTEM SECURITY

Server Security Client Security Network Security

PRIVACY

Concern of revealing personal information Concern of being tracked

Page 16: Blind authentication

Server securityHacker gains access to the template database

Client securityHacker gains access to the user’s biometric or private keyPassive attack at the user’s computer

Page 17: Blind authentication

Concern of revealing personal information-Template is never revealed to the server.

Privacy

Page 18: Blind authentication

ADVANTAGES OF BLIND AUTHENTICATION

• Fast and Provably Secure authentication without trading off accuracy.

• Supports generic classifiers such as Neural Network and SVMs.

• Ideal for applications such as biometric ATMs etc.

Page 19: Blind authentication

CONCLUSION

Verification can be done in real-time with the help of available hardware.

Keep the interaction between the user and the server to a minimum.

Extensions to this work includes secure enerollment protocols and encryption methods to reduce computations.

Page 20: Blind authentication

REFERENCES

www.wikipedia.org

www.studymafiya.org

Page 21: Blind authentication

THANK YOUTHANK YOU

Page 22: Blind authentication

QUERIES ??QUERIES ??


Recommended