Wolf Attack Probability : A Theoretical Security Measure in Biometric Authentication Systems
スポンサーリンク
概要
- 論文の詳細を見る
This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.
- (社)電子情報通信学会の論文
- 2008-05-01
著者
-
Otsuka Akira
Research Center For Information Security Aist
-
Imai Hideki
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Une Masashi
Center For Information Technology Studies Institute For Monetary And Economic Studies Bank Of Japan
-
Imai Hideki
Research Center For Information Security National Institute Of Advanced Industrial Science And Techn
-
Otsuka Akira
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An
-
Otsuka Akira
Research Center For Information Security National Institute Of Advanced Industrial Science And Techn
関連論文
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Unconditionally Secure Chaffing-and-Winnowing
- An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
- A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
- A New Security Architecture for Personal Networks and Its Performance Evaluation
- RSA-Based Password-Authenticated Key Exchange, Revisited
- A Secure Authenticated Key Exchange Protocol for Credential Services
- An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction(Information Security)
- Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
- Asymmetric RFID System Secure against Active Attack
- IVs to Skip for Immunizing WEP against FMS Attack
- An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation
- Enhanced Cancelable Biometrics for Online Signature Verification
- Tag-KEM from Set Partial Domain One-Way Permutations
- CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
- Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption
- Searchable Public-key Broadcast Encryption
- CCA-secure IBE Scheme with Tight Security Reduction based on the Gap BDH Assumption
- A Provably Secure Refreshable Partially Anonymous Token and Its Applications(Discrete Mathematics and Its Applications)
- An Efficient Anonymous Authentication Scheme with No Unlinkability
- A Formulation of Key Privacy in Plaintext Checking Attack Model
- Key-Dependent Weak IVs and Weak Keys in WEP : How to Trace Conditions Back to Their Patterns(Information Security)
- Strong Anonymous Signature
- Combining Public Key Encryption with Keyword Search and Public Key Encryption
- Wolf Attack Probability : A Theoretical Security Measure in Biometric Authentication Systems
- Strength of interaction for information distribution and generalized Wigner-Araki-Yanase theorem
- A Dynamical Bifurcation of Distinguishability in Thermalization Processes, from Classical to Quantum (特集:量子計算と量子情報)
- Wolf fingerprints against minutiae count matching systems
- A Dynamical Bifurcation of Distinguishability in Thermalization Processes, from Classical to Quantum