Article (Scientific journals)
Remote secure object authentication: Secure sketches, fuzzy extractors, and security protocols
Arenas, Mónica P.; FOTIADIS, Georgios; LENZINI, Gabriele et al.
2025In Computers and Security, 148, p. 104131
Peer Reviewed verified by ORBi
 

Files


Full Text
1-s2.0-S016740482400436X-main.pdf
Publisher postprint (1.45 MB) Creative Commons License - Attribution, Non-Commercial, No Derivative
Download

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
Authentication; Fingerprint-like features; Remote authentication protocol; Robust fuzzy extractor; Robust secure sketch; Secrecy; Authentication protocols; Fingerprint-like feature; Fuzzy extractors; Remote authentication; Robust fuzzy; Secure sketch; Computer Science (all); Law
Abstract :
[en] Coating objects with microscopic droplets of liquid crystals makes it possible to identify and authenticate objects as if they had biometric-like features: this is extremely valuable as an anti-counterfeiting measure. How to extract features from images has been studied elsewhere, but exchanging data about features is not enough if we wish to build secure cryptographic authentication protocols. What we need are authentication tokens (i.e., bitstrings), strategies to cope with noise, always present when processing images, and solutions to protect the original features so that it is impossible to reproduce them from the tokens. Secure sketches and fuzzy extractors are the cryptographic toolkits that offer these functionalities, but they must be instantiated to work with the peculiar specific features extracted from images of liquid crystals. We show how this can work and how we can obtain uniform, error-tolerant, and random strings, and how they are used to authenticate liquid crystal coated objects. Our protocol reminds an existing biometric-based protocol, but only apparently. Using the original protocol as-it-is would make the process vulnerable to an attack that exploits certain physical peculiarities of our liquid crystal coatings. Instead, our protocol is robust against the attack. We prove all our security claims formally, by modeling and verifying in Proverif, our protocol and its cryptographic schemes. We implement and benchmark our solution, measuring both the performance and the quality of authentication.
Disciplines :
Computer science
Author, co-author :
Arenas, Mónica P. ;  SnT, University of Luxembourg, Esch-sur-Alzette, Luxembourg
FOTIADIS, Georgios  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust > APSIA > Team Peter RYAN
LENZINI, Gabriele  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > IRiSC
RAKEEI, Mohammadamin  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > IRiSC
External co-authors :
no
Language :
English
Title :
Remote secure object authentication: Secure sketches, fuzzy extractors, and security protocols
Publication date :
January 2025
Journal title :
Computers and Security
ISSN :
0167-4048
Publisher :
Elsevier Ltd
Volume :
148
Pages :
104131
Peer reviewed :
Peer Reviewed verified by ORBi
Available on ORBilu :
since 14 October 2024

Statistics


Number of views
150 (15 by Unilu)
Number of downloads
103 (4 by Unilu)

Scopus citations®
 
2
Scopus citations®
without self-citations
1
OpenCitations
 
0
OpenAlex citations
 
3

Bibliography


Similar publications



Contact ORBilu