Cryptology ePrint Archive: Report 2017/1177

Reusable Authentication from the Iris

Sailesh Simhadri and James Steel and Benjamin Fuller

Abstract: Mobile platforms use biometrics for authentication. Unfortunately, biometrics exhibit noise between repeated readings. Due to the noise, biometrics are stored in plaintext, so device compromise completely reveals the user's biometric value.

To limit privacy violations, one can use fuzzy extractors to derive a stable cryptographic key from biometrics (Dodis et al., Eurocrypt 2004). Unfortunately, fuzzy extractors have not seen wide deployment due to insufficient security guarantees. Current fuzzy extractors provide no security for real biometric sources and no security if a user enrolls the same biometric with multiple devices or providers.

Previous work claims key derivation systems from the iris but only under weak adversary models. In particular, no known construction securely handles the case of multiple enrollments. Canetti et al. (Eurocrypt 2016) proposed a new fuzzy extractor called sample-then-lock.

We construct biometric key derivation for the iris starting from sample-then-lock. Achieving satisfactory parameters requires modifying and coupling of the image processing and the cryptography. Our construction is implemented in Python and being open-sourced. Our system has the following novel features:

-- 45 bits of security. This bound is pessimistic, assuming the adversary can sample strings distributed according to the iris in constant time. Such an algorithm is not known.

-- Secure enrollment with multiple services.

-- Natural incorporation of a password, enabling multifactor authentication. The structure of the construction allows the overall security to be sum of the security of each factor (increasing security to 79 bits).

Category / Keywords: key derivation; fuzzy extractors; authentication

Date: received 1 Dec 2017, last revised 14 Dec 2017

Contact author: benjamin fuller at uconn edu

Available format(s): PDF | BibTeX Citation

Version: 20171214:145154 (All versions of this report)

Short URL: ia.cr/2017/1177

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]