TY - GEN
T1 - Recovering attacks against linear sketch in fuzzy signature schemes of ACNS 2015 and 2016
AU - Yasuda, Masaya
AU - Shimoyama, Takeshi
AU - Takenaka, Masahiko
AU - Abe, Narishige
AU - Yamada, Shigefumi
AU - Yamaguchi, Junpei
PY - 2017/1/1
Y1 - 2017/1/1
N2 - In biometrics, template protection aims to protect the confidentiality of templates (i.e., enrolled biometric data) by certain conversion. At ACNS 2015, as a new approach of template protection, Takahashi et al. proposed a new concept of digital signature, called “fuzzy signature”, that uses biometric data as a private key for securely generating a signature. After that, at ACNS 2016, Matsuda et al. modified the original scheme with several relaxing requirements. A main ingredient of fuzzy signature is “linear sketch”, which incorporates a kind of linear encoding and error correction process to securely output only the difference of signing keys without revealing any biometric data. In this paper, we give recovering attacks against the linear sketch schemes proposed at ACNS 2015 and 2016. Specifically, given encoded data by linear sketch (called a “sketch”), our attacks can directly recover both the signing key and the biometric data embedded in the sketch. Our attacks make use of the special structure that a sketch has the form of a sum of an integral part and a decimal part, and biometric data is embedded in the decimal part. On the other hand, we give a simple countermeasure against our attacks and discuss the effect in both theory and practice.
AB - In biometrics, template protection aims to protect the confidentiality of templates (i.e., enrolled biometric data) by certain conversion. At ACNS 2015, as a new approach of template protection, Takahashi et al. proposed a new concept of digital signature, called “fuzzy signature”, that uses biometric data as a private key for securely generating a signature. After that, at ACNS 2016, Matsuda et al. modified the original scheme with several relaxing requirements. A main ingredient of fuzzy signature is “linear sketch”, which incorporates a kind of linear encoding and error correction process to securely output only the difference of signing keys without revealing any biometric data. In this paper, we give recovering attacks against the linear sketch schemes proposed at ACNS 2015 and 2016. Specifically, given encoded data by linear sketch (called a “sketch”), our attacks can directly recover both the signing key and the biometric data embedded in the sketch. Our attacks make use of the special structure that a sketch has the form of a sum of an integral part and a decimal part, and biometric data is embedded in the decimal part. On the other hand, we give a simple countermeasure against our attacks and discuss the effect in both theory and practice.
UR - http://www.scopus.com/inward/record.url?scp=85038084486&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85038084486&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-72359-4_24
DO - 10.1007/978-3-319-72359-4_24
M3 - Conference contribution
AN - SCOPUS:85038084486
SN - 9783319723587
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 409
EP - 421
BT - Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings
A2 - Liu, Joseph K.
A2 - Samarati, Pierangela
PB - Springer Verlag
T2 - 13th International Conference on Information Security Practice and Experience, ISPEC 2017
Y2 - 13 December 2017 through 15 December 2017
ER -