Abstract
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly speaking, AMACs represent a way to provide data authentication that is tolerant to acceptable modifications of the original message. Although constructs had been proposed for this primitive, no security analysis or even modeling had been done.
In this paper we propose a rigorous model for the design and security analysis of AMACs. We then present two AMAC constructions with desirable efficiency and security properties.
AMAC is a useful primitive with several applications of different nature. A major one, that we study in this paper, is that of entity authentication via biometric techniques or passwords over noisy channels. We present a formal model for the design and analysis of biometric entity authentication schemes and show simple and natural constructions of such schemes starting from any AMAC.
Copyright Telcordia Technologies. Prepared through collaborative participation in the Communications and Networks Consortium sponsored by the U. S. Army Research Laboratory under the Collaborative Technology Alliance Program, Cooperative Agreement DAAD19-01-2-0011. The U. S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation thereon.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
- Authentication Scheme
- Message Authentication
- Entity Authentication
- Fuzzy Extractor
- Symmetric Encryption Scheme
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: UMAC: Fast and Secure Message Authentication. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 216. Springer, Heidelberg (1999)
Boyen, X.: Reusable Cryptographic Fuzzy Extractors. In: Proc. of 11th ACM Conference on Computer and Communication Security (2004)
Davida, G., Frankel, Y., Matt, B.: On Enabling Secure Application through Off-Line Biometric Identification. In: Proc. of 1998 IEEE Symposium on Research in Security and Privacy (1998)
Di Crescenzo, G., Graveman, R.F., Arce, G., Ge, R.: A Formal Security Analysis of Approximate Message Authentication Codes. In: Proc. of the 2003 CTA Annual Symposium, a US Dept. of Defense publication (2003)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)
Graveman, R.F., Fu, K.: Approximate Message Authentication Codes. In: Proc. of 3rd Annual Symposium on Advanced Telecommunications & Information Distribution Research Program, ATIRP (1999)
Indyk, P., Motwani, R., Raghavan, P., Vempala, S.: Locality-Preserving Hashing in Multidimensional Spaces. In: Proc. of ACM STOC 1997 (1997)
Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in a Networked Society. Kluwer Academic Publishers, Dordrecht (1999)
Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proc. of IEEE International Symposium on Information Theory (2002)
Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: Proc. of 6th ACM Conference on Computer and Communication Security (1999)
Linial, N., Sasson, O.: Non-Expansive Hashing. In: Proc. of ACM STOC (1996)
Martinian, E., Chen, B., Wornell, G.: Information Theoretic Approach to the Authentication of Multimedia. In: Proc. of SPIE Conference on Electronic Imaging (2001)
Martinian, E., Chen, B., Wornell, G.: On Authentication With Distortion Constraints. In: Proc. of IEEE International Symposium on Information Theory (2001)
Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: Proc. of ACM STOC 1989 (1989)
Prabhakar, S., Pankanti, S., Jain, A.: Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy Magazine 1(2) (March 2003)
Schneier, B.: Inside Risks: The Uses and Abuses of Biometrics. Communications of the ACM 42(8), 136 (1999)
Xie, L., Arce, G.R., Graveman, R.F.: Approximate Image Message Authentication Codes. IEEE Transactions on Multimedia 3 (June 2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Di Crescenzo, G., Graveman, R., Ge, R., Arce, G. (2005). Approximate Message Authentication and Biometric Entity Authentication. In: Patrick, A.S., Yung, M. (eds) Financial Cryptography and Data Security. FC 2005. Lecture Notes in Computer Science, vol 3570. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11507840_22
Download citation
DOI: https://doi.org/10.1007/11507840_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26656-3
Online ISBN: 978-3-540-31680-0
eBook Packages: Computer ScienceComputer Science (R0)