An Efficient Double-Offloading Biometric Authentication Scheme Based on Blockchain for Cross Domain Environment

In order to solve the problems of few and complex traditional cross domain authentication schemes, a double-offloading biometric authentication for cross domain scheme based on blockchain technology was proposed. Firstly, we use fuzzy extraction technology to extract the random key of biometric auth...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless personal communications 2022, Vol.125 (1), p.599-618
Hauptverfasser: Xu, Yuguang, Meng, Yanlin, Zhu, Hongfeng
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In order to solve the problems of few and complex traditional cross domain authentication schemes, a double-offloading biometric authentication for cross domain scheme based on blockchain technology was proposed. Firstly, we use fuzzy extraction technology to extract the random key of biometric authentication, so the problem of the biometrics leakage caused by the permanent unavailability was solved. Secondly, we use the untamable blockchain to store biometric public information, and the threat of the fuzzy extraction technology which is vulnerable to be active attacked was solved. Finally, based on the distributed storage function and consortium blockchain architecture, we achieve the biometrics cross domain authentication of user in local and remote environment. In addition, for double-offloading, one of them is when the scheme offloads the server of the user's registered domain, which is no longer needed after helping the user register and submit information to the blockchain service node. The other offloading is the blockchain service node can be offloaded when the other domain server gets and stores the authenticated information of the client. The security and efficiency analysis show that our scheme is not only secure but also practical. Finally, we give the security proof and the efficiency analysis of our proposed scheme.
ISSN:0929-6212
1572-834X
DOI:10.1007/s11277-022-09567-4