8 CONCLUSIONS
Protecting sensitive biometric data is crucially im-
portant for remote biometric authentication, because
once compromised, the biometric data becomes no
longer useful for distinguishing between its legitimate
owner and anyone else who possess a copy.
We present a new method for adding strong bio-
metric data protection to a wide class of existing bio-
metric authentication protocols, making them an at-
tractive alternativeto password authentication. In par-
ticular, biometric data is never stored on the server,
only on the user’s token, and then only in encrypted
form. The token itself requires no secure storage; the
biometric data cannot be recovered even if an attacker
has full and complete access to everything stored on
the token. A lost token also cannot be used to imper-
sonate its owner.
Our method is computationally efficient and has
the same recognition performance as the underlying
feature extraction scheme. It also allows the creation
of independent personas provide enhanced privacy of
users’ actions across different verifying parties.
REFERENCES
Anderson, R. and Kuhn, M. (1996). Tamper resistance-a
cautionary note. In Proceedings of the second Usenix
workshop on electronic commerce, volume 2.
Ballard, L., Kamara, S., Monrose, F., and Reiter, M. K.
(2008). Towards practical biometric key generation
with randomized biometric templates. In Conference
on Computer and Communications Security.
Bellare, M. and Yee, B. (2003). Forward-security in private-
key cryptography. In Topics in Cryptology - CT RSA.
Blum, L., Blum, M., and Shub, M. (1986). A simple un-
predictable pseudo random number generator. SIAM
J. Comput.
Boyd, M., Carmaciu, D., Giannaros, F., Payne, T., and
Snell, W. (2010). Iris recognition (project iris).
http://projectiris.co.uk/.
Daugman, J. (2002). How iris recognition works. IEEE
Trans. on Circuits and Systems for Video Technology.
Dodis, Y., Ostrovsky, R., Reyzin, L., and Smith, A. (2008).
Fuzzy extractors: How to generate strong keys from
biometrics and other noisy data. SIAM J. Comput.
Dodis, Y., Reyzin, L., and Smith, A. (2004). Fuzzy extrac-
tors: How to generate strong keys from biometrics and
other noisy data. In EUROCRYPT.
FIDOa (2014). FIDO alliance: Mission.
http://fidoalliance.org/about.
FIDOb (2014). FIDO alliance: Specifications overview.
http://fidoalliance.org/specifications.
Gentry, C. (2009). A fully homomorphic encryption scheme.
PhD thesis, Stanford University.
Goldreich, O. (2001). Foundations of Cryptography: Vol-
ume 1, Basic Tools. Cambridge University Press.
Hong, S., Jeon, W., Kim, S., Won, D., and Park, C. (2008).
The vulnerabilities analysis of fuzzy vault using pass-
word. In International Conference on Future Genera-
tion Communication and Networking.
Institute of Automation, Chinese Academy of Sci-
ences CASIA (2012). Iris image databases.
http://www.cbsr.ia.ac.cn/english/IrisDatabase.asp.
Jain, A., Ross, A., and Nandakumar, K. (2011). Introduc-
tion to Biometrics. Springer.
Jain, A. K., Nandakumar, K., and Nagar, A. (2008). Bio-
metric template security. EURASIP J. Adv. Signal Pro-
cess.
Jin, A., Ling, D., and Goh, A. (2004). Biohashing: two
factor authentication featuring fingerprint data and to-
kenised random number. Pattern Recognition.
Juels, A. and Sudan, M. (2006). A fuzzy vault scheme.
Designs, Codes and Cryptography.
Juels, A. and Wattenberg, M. (1999). A fuzzy commitment
scheme. In ACM Conference on Computer and Com-
munications Security.
Kessler, G. C. (1996). Passwords
– strengths and weaknesses.
http://www.garykessler.net/library/password.html.
Kong, A., Cheung, K.-H., Zhang, D., Kamel, M., and You,
J. (2006). An analysis of biohashing and its variants.
Pattern Recognition.
Lindell, Y. and Pinkas, B. (2007). An efficient protocol
for secure two-party computation in the presence of
malicious adversaries. In Advances in Cryptology-
EUROCRYPT 2007. Springer.
Lumini, A. and Nanni, L. (2007). An improved biohashing
for human authentication. Pattern Recognition.
Masek, L. and Kovesi, P. (2003). Matlab source code for a
biometric identification system based on iris patterns.
Technical report, University of Western Australia.
Nagar, A. (2012). Biometric Template Security. Disserta-
tion, Michigan State University.
Nandakumar, K., Nagar, A., and Jain, A. K. (2007). Hard-
ening fingerprint fuzzy vault using password. In Inter-
national Conference on Advances in Biometrics.
Rane, S., Nagar, A., and Vetro, A. (2010). Method and
system for binarization of biometric data. US Patent
App. 12/688,089.
Ratha, N. K., Connell, J. H., and Bolle, R. M. (2001). En-
hancing security and privacy in biometrics-based au-
thentication systems. IBM Syst. J.
Rathgeb, C. and Uhl, A. (2011). A survey on biometric
cryptosystems and cancelable biometrics. EURASIP
Journal on Information Security.
Smart (2011). Smart cards and biometrics. A Smart Card
Alliance Physical Access Council White Paper. Pub-
lication Number: PAC-11002.
Syta, E., Fischer, M. J., , Wolinsky, D., Silberschatz, A.,
Garc´ıa, G. G., and Ford, B. (2015). Private Eyes:
Secure Remote Biometric Authentication (Extended
Version). Technical Report TR1510, Yale University.
VeriSign (2012). Symantec Corporation web site.
http://www.verisign.com/.
Waraksa, T. J., Michaels, P. A., Slaughter, S. A., Poirier,
J. A., and Rea, I. B. (1995). Rolling code for a keyless
entry system. US Patent 5,412,379.
SECRYPT2015-InternationalConferenceonSecurityandCryptography
250