首页> 外文OA文献 >Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer
【2h】

Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer

机译:基于无意识转移的汉明距离计算协议的安全性和效率分析

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme usesOblivious Transfer and provides security in the semi-honest model. The other scheme uses Committed Oblivious Transferand is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometricauthentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form.In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, ourattack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance which isdifferent from the actual value. For biometric authentication systems, this attack allows a malicious adversary to pass theauthentication without knowledge of the honest user’s input with at most O(n) complexity instead of O(2n), where n isthe input length. We propose an enhanced version of their protocol where this attack is eliminated. The security of ourmodified protocol is proven using the simulation-based paradigm. Furthermore, as for efficiency concerns, the modifiedprotocol utilizes Verifiable Oblivious Transfer which does not require the commitments to outputs which improves itsefficiency significantly.
机译:Bringer等。提出了两种用于计算汉明距离的密码协议。他们的第一个方案使用了Oblivious Transfer,并在半诚实模型中提供了安全性。另一种使用承诺遗忘传输的方案,据称可在恶意情况下提供全面的安全性。所提出的协议对证明者和验证者之间的生物特征认证方案具有直接的意义,其中验证者具有纯形式的用户生物特征数据。在本文中,我们证明了他们的协议实际上并不能完全安全地防御恶意对手。更准确地说,我们的攻击破坏了协议的健全性,恶意用户可以在其中计算与实际值不同的汉明距离。对于生物特征认证系统,此攻击使恶意攻击者可以通过身份验证,而无需了解诚实用户的输入最多为O(n)复杂度,而不是O(2n),其中n为输入长度。我们提出了他们协议的增强版本,可以消除这种攻击。我们修改后的协议的安全性已通过基于仿真的范例进行了证明。此外,关于效率问题,修改后的协议利用了可验证的遗忘转移,不需要对输出的承诺,从而大大提高了效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号