首页> 外文期刊>Security and Communications Networks >Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer
【24h】

Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer

机译:基于遗忘传递的汉明距离计算协议的安全性和效率分析

获取原文
获取原文并翻译 | 示例

摘要

Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses oblivious transfer and provides security in the semi-honest model. The other scheme uses committed oblivious transfer and is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometric authentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form. In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, our attack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance, which is different from the actual value. For biometric authentication systems, this attack allows a malicious adversary to pass the authentication without knowledge of the honest user's input with at most O(n) complexity instead of O(2(n)), where n is the input length. We propose an enhanced version of their protocol where this attack is eliminated. The security of our modified protocol is proven using the simulation-based paradigm. Furthermore, as for efficiency concerns, the modified protocol utilizes verifiable oblivious transfer, which does not require the commitments to outputs, which improves its efficiency significantly. Copyright (C) 2015 John Wiley & Sons, Ltd.
机译:Bringer等。提出了两种用于计算汉明距离的密码协议。他们的第一个方案使用遗忘传输,并在半诚实模型中提供安全性。另一种方案使用承诺的遗忘传输,并声称在恶意情况下可提供完全的安全性。所提出的协议对证明者与验证者之间的生物特征认证方案具有直接的意义,其中该检验者具有用户的生物特征数据为纯格式。在本文中,我们证明了他们的协议实际上并不能完全安全地防御恶意攻击者。更准确地说,我们的攻击破坏了协议的健全性,恶意用户可以在其中计算与实际值不同的汉明距离。对于生物特征认证系统,此攻击允许恶意攻击者通过身份认证,而无需了解诚实用户的输入最多为O(n)而不是O(2(n)),其中n为输入长度。我们提出了他们协议的增强版本,可以消除这种攻击。我们修改后的协议的安全性已通过基于仿真的范例得到证明。此外,关于效率,修改后的协议利用了可验证的遗忘传输,不需要对输出的承诺,从而大大提高了效率。版权所有(C)2015 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号