DocumentCode :
19035
Title :
Security Considerations in Minutiae-Based Fuzzy Vaults
Author :
Tams, Benjamin ; Mihailescu, Preda ; Munk, Axel
Author_Institution :
Inst. for Math. Stochastics, Univ. of Goettingen, Gottingen, Germany
Volume :
10
Issue :
5
fYear :
2015
fDate :
May-15
Firstpage :
985
Lastpage :
998
Abstract :
The fuzzy vault scheme is a cryptographic primitive that can be used to protect human fingerprint templates where stored. Analyses for most implementations account for brute-force security only. There are, however, other risks that have to be consider, such as false-accept attacks, record multiplicity attacks, and information leakage from auxiliary data, such as alignment parameters. In fact, the existing work lacks analyses of these weaknesses and are even susceptible to a variety of them. In view of these vulnerabilities, we redesign a minutiae-based fuzzy vault implementation preventing an adversary from running attacks via record multiplicity. Furthermore, we propose a mechanism for robust absolute fingerprint prealignment. In combination, we obtain a fingerprint-based fuzzy vault that resists known record multiplicity attacks and that does not leak information about the protected fingerprints from auxiliary alignment data. By experiments, we evaluate the performance of our security-improved implementation that, even though it has slight usability merits as compared with other minutiae-based implementations, provides improved security. However, despite heavy efforts spent in improving security, our implementation is, like all other implementations based on a single finger, subjected to a fundamental security limitation related to the false acceptance rate, i.e., false-accept attack. Consequently, this paper supports the notion that a single finger is not sufficient to provide acceptable security. Instead, implementations for multiple finger or even multiple modalities should be deployed the security of which may be improved by the technical contributions of this paper.
Keywords :
cryptography; fuzzy set theory; auxiliary alignment data; cryptographic primitive; false acceptance rate; false-accept attack; fundamental security limitation; human fingerprint template protection; known record multiplicity attacks; minutiae-based fuzzy vault implementation; record multiplicity; robust absolute fingerprint prealignment; running attacks; Correlation; Cryptography; Immune system; Polynomials; Quantization (signal); Vectors; Fingerprint; cryptanalyses; fingerprint; fuzzy vault scheme; implementation; minutiae; security;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2015.2392559
Filename :
7010053
Link To Document :
بازگشت