首页> 外文OA文献 >Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer
【2h】

Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer

机译:基于遗忘传递的汉明距离计算协议的安全性和效率分析

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses oblivious transfer and provides security in the semi-honest model. The other scheme uses committed oblivious transfer and is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometric authentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form. In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, our attack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance, which is different from the actual value. For biometric authentication systems, this attack allows a malicious adversary to pass the authentication without knowledge of the honest user's input with at most O(n) complexity instead of O(2n), where n is the input length. We propose an enhanced version of their protocol where this attack is eliminated. The security of our modified protocol is proven using the simulation-based paradigm. Furthermore, as for efficiency concerns, the modified protocol utilizes verifiable oblivious transfer, which does not require the commitments to outputs, which improves its efficiency significantly.
机译:Bringer等。提出了两种用于计算汉明距离的密码协议。他们的第一个方案使用遗忘传输,并在半诚实模型中提供安全性。另一种方案使用承诺的遗忘传输,并声称在恶意情况下可提供完全的安全性。所提出的协议对证明者与验证者之间的生物特征认证方案具有直接的意义,其中该检验者具有用户的生物特征数据为纯格式。在本文中,我们证明了他们的协议实际上并不能完全安全地防御恶意攻击者。更准确地说,我们的攻击破坏了协议的健全性,恶意用户可以在其中计算与实际值不同的汉明距离。对于生物特征认证系统,此攻击允许恶意攻击者通过身份认证,而无需了解诚实用户的输入,复杂度最多为O(n)而不是O(2n),其中n为输入长度。我们提出了他们协议的增强版本,可以消除这种攻击。我们修改后的协议的安全性已通过基于仿真的范例得到证明。此外,关于效率,修改后的协议利用了可验证的遗忘传输,不需要对输出的承诺,从而大大提高了效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号