Skip to main content

Approximate Message Authentication and Biometric Entity Authentication

  • Conference paper
Financial Cryptography and Data Security (FC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3570))

Included in the following conference series:

Abstract

Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly speaking, AMACs represent a way to provide data authentication that is tolerant to acceptable modifications of the original message. Although constructs had been proposed for this primitive, no security analysis or even modeling had been done.

In this paper we propose a rigorous model for the design and security analysis of AMACs. We then present two AMAC constructions with desirable efficiency and security properties.

AMAC is a useful primitive with several applications of different nature. A major one, that we study in this paper, is that of entity authentication via biometric techniques or passwords over noisy channels. We present a formal model for the design and analysis of biometric entity authentication schemes and show simple and natural constructions of such schemes starting from any AMAC.

Copyright Telcordia Technologies. Prepared through collaborative participation in the Communications and Networks Consortium sponsored by the U. S. Army Research Laboratory under the Collaborative Technology Alliance Program, Cooperative Agreement DAAD19-01-2-0011. The U. S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation thereon.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: UMAC: Fast and Secure Message Authentication. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 216. Springer, Heidelberg (1999)

    Google Scholar 

  2. Boyen, X.: Reusable Cryptographic Fuzzy Extractors. In: Proc. of 11th ACM Conference on Computer and Communication Security (2004)

    Google Scholar 

  3. Davida, G., Frankel, Y., Matt, B.: On Enabling Secure Application through Off-Line Biometric Identification. In: Proc. of 1998 IEEE Symposium on Research in Security and Privacy (1998)

    Google Scholar 

  4. Di Crescenzo, G., Graveman, R.F., Arce, G., Ge, R.: A Formal Security Analysis of Approximate Message Authentication Codes. In: Proc. of the 2003 CTA Annual Symposium, a US Dept. of Defense publication (2003)

    Google Scholar 

  5. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Graveman, R.F., Fu, K.: Approximate Message Authentication Codes. In: Proc. of 3rd Annual Symposium on Advanced Telecommunications & Information Distribution Research Program, ATIRP (1999)

    Google Scholar 

  7. Indyk, P., Motwani, R., Raghavan, P., Vempala, S.: Locality-Preserving Hashing in Multidimensional Spaces. In: Proc. of ACM STOC 1997 (1997)

    Google Scholar 

  8. Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in a Networked Society. Kluwer Academic Publishers, Dordrecht (1999)

    Google Scholar 

  9. Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proc. of IEEE International Symposium on Information Theory (2002)

    Google Scholar 

  10. Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: Proc. of 6th ACM Conference on Computer and Communication Security (1999)

    Google Scholar 

  11. Linial, N., Sasson, O.: Non-Expansive Hashing. In: Proc. of ACM STOC (1996)

    Google Scholar 

  12. Martinian, E., Chen, B., Wornell, G.: Information Theoretic Approach to the Authentication of Multimedia. In: Proc. of SPIE Conference on Electronic Imaging (2001)

    Google Scholar 

  13. Martinian, E., Chen, B., Wornell, G.: On Authentication With Distortion Constraints. In: Proc. of IEEE International Symposium on Information Theory (2001)

    Google Scholar 

  14. Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: Proc. of ACM STOC 1989 (1989)

    Google Scholar 

  15. Prabhakar, S., Pankanti, S., Jain, A.: Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy Magazine 1(2) (March 2003)

    Google Scholar 

  16. Schneier, B.: Inside Risks: The Uses and Abuses of Biometrics. Communications of the ACM 42(8), 136 (1999)

    Article  Google Scholar 

  17. Xie, L., Arce, G.R., Graveman, R.F.: Approximate Image Message Authentication Codes. IEEE Transactions on Multimedia 3 (June 2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Di Crescenzo, G., Graveman, R., Ge, R., Arce, G. (2005). Approximate Message Authentication and Biometric Entity Authentication. In: Patrick, A.S., Yung, M. (eds) Financial Cryptography and Data Security. FC 2005. Lecture Notes in Computer Science, vol 3570. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11507840_22

Download citation

  • DOI: https://doi.org/10.1007/11507840_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26656-3

  • Online ISBN: 978-3-540-31680-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics