Title :
A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems
Author :
Wang, Ye ; Rane, Shantanu ; Draper, Stark C. ; Ishwar, Prakash
Author_Institution :
Dept. of Electr. & Comput. Eng., Boston Univ., Boston, MA, USA
Abstract :
We present a theoretical framework for the analysis of privacy and security trade-offs in secure biometric authentication systems. We use this framework to conduct a comparative information-theoretic analysis of two biometric systems that are based on linear error correction codes, namely fuzzy commitment and secure sketches. We derive upper bounds for the probability of false rejection (PFR) and false acceptance (PFA) for these systems. We use mutual information to quantify the information leaked about a user´s biometric identity, in the scenario where one or multiple biometric enrollments of the user are fully or partially compromised. We also quantify the probability of successful attack (PSA) based on the compromised information. Our analysis reveals that fuzzy commitment and secure sketch systems have identical PFR, PFA, PSA, and information leakage, but secure sketch systems have lower storage requirements. We analyze both single-factor (keyless) and two-factor (key-based) variants of secure biometrics, and consider the most general scenarios in which a single user may provide noisy biometric enrollments at several access control devices, some of which may be subsequently compromised by an attacker. Our analysis highlights the revocability and reusability properties of key-based systems and exposes a subtle design trade-off between reducing information leakage from compromised systems and preventing successful attacks on systems whose data have not been compromised.
Keywords :
biometrics (access control); data privacy; error correction codes; fuzzy set theory; information theory; message authentication; probability; access control devices; authentication; biometric authentication system security; false acceptance; false rejection probability; fuzzy commitment; information leakage; information-theoretic analysis; key-based systems; linear error correction codes; mutual information; privacy; reusability properties; revocability properties; secure sketch system; single-factor variants; successful attack probability; two-factor variants; user biometric identity; Access control; Authentication; Biometrics; Error correction codes; Noise measurement; Probes; Biometrics; fuzzy commitment; information leakage; privacy; reusability; revocability; secure sketch; security;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2012.2210215