Skip to main content
placeholder image

Lattice-based remote user authentication from reusable fuzzy signature

Journal Article


Abstract


  • In this paper, we introduce a new construction of reusable fuzzy signature based remote user authentication that is secure against quantum computers. We investigate the reusability of fuzzy signature, and we prove that the fuzzy signature schemes provide biometrics reusability (aka. reusable fuzzy signature). We define formal security models for the proposed construction, and we prove that it achieves user authenticity and user privacy. The proposed construction ensures: 1) a user's biometrics can be securely reused in remote user authentication; 2) a third party having access to the communication channel between a user and the authentication server cannot identify the user.

Publication Date


  • 2021

Citation


  • Tian, Y., Li, Y., Deng, R. H., Sengupta, B., & Yang, G. (2021). Lattice-based remote user authentication from reusable fuzzy signature. Journal of Computer Security, 29(3), 273-298. doi:10.3233/JCS-191370

Scopus Eid


  • 2-s2.0-85105718323

Start Page


  • 273

End Page


  • 298

Volume


  • 29

Issue


  • 3

Abstract


  • In this paper, we introduce a new construction of reusable fuzzy signature based remote user authentication that is secure against quantum computers. We investigate the reusability of fuzzy signature, and we prove that the fuzzy signature schemes provide biometrics reusability (aka. reusable fuzzy signature). We define formal security models for the proposed construction, and we prove that it achieves user authenticity and user privacy. The proposed construction ensures: 1) a user's biometrics can be securely reused in remote user authentication; 2) a third party having access to the communication channel between a user and the authentication server cannot identify the user.

Publication Date


  • 2021

Citation


  • Tian, Y., Li, Y., Deng, R. H., Sengupta, B., & Yang, G. (2021). Lattice-based remote user authentication from reusable fuzzy signature. Journal of Computer Security, 29(3), 273-298. doi:10.3233/JCS-191370

Scopus Eid


  • 2-s2.0-85105718323

Start Page


  • 273

End Page


  • 298

Volume


  • 29

Issue


  • 3