Authentication under Constraints
Licentiate thesis, 2016

Authentication has become a critical step to gain access to services such as on-line banking, e-commerce, transport systems and cars (contact-less keys). In several cases, however, the authentication process has to be performed under challenging conditions. This thesis is essentially a compendium of five papers which are the result of a two-year study on authentication in constrained settings. The two major constraints considered in this work are: (1) the noise and (2) the computational power. For what concerns authentication under noisy conditions, Paper A and Paper B ad- dress the case in which the noise is in the authentication credentials. More precisely, the aforementioned papers present attacks against biometric authentication systems, that exploit the inherent variant nature of biometric traits to gain information that should not be leaked by the system. Paper C and Paper D study proximity- based authentication, i.e., distance-bounding protocols. In this case, both of the constraints are present: the possible presence of noise in the channel (which affects communication and thus the authentication process), as well as resource constraints on the computational power and the storage space of the authenticating party (called the prover, e.g., an RFID tag). Finally, Paper E investigates how to achieve reliable verification of the authenticity of a digital signature, when the verifying party has limited computational power, and thus offloads part of the computations to an untrusted server. Throughout the presented research work, a special emphasis is given to privacy concerns risen by the constrained conditions.

Security.

Distance-Bounding

Privacy

Biometrics

Anonymity

Authentication

Digital Signatures

EC
Opponent: Claudio Orlandi

Author

Elena Pagnin

Chalmers, Computer Science and Engineering (Chalmers), Networks and Systems (Chalmers)

On the Leakage of Information in Biometric Authentication

In Proceedings of Indocrypt - 15th International Conference on Cryptology in India 2014, New Delhi, December 2014.,;(2014)p. 265-280

Paper in proceeding

Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours

IEEE Communications Letters,;Vol. 19(2015)p. 1173-1176

Journal article

Attacks on Privacy-Preserving Biometric Authentication

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),;Vol. 8788(2014)p. 293-294

Paper in proceeding

Subject Categories

Other Computer and Information Science

Computer Science

Areas of Advance

Information and Communication Technology

EC

Opponent: Claudio Orlandi

More information

Created

10/8/2017