Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Information Security

Singapore Management University

2018

Generic framework

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Dsh: Deniable Secret Handshake Framework, Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li, Guomin Yang, Yong Yu Sep 2018

Dsh: Deniable Secret Handshake Framework, Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li, Guomin Yang, Yong Yu

Research Collection School Of Computing and Information Systems

Secret handshake is a useful primitive that allows a group of authorized users to establish a shared secret key and authenticate each other anonymously. It naturally provides a certain degree of user privacy and deniability which are also desirable for some private conversations that require secure key establishment. The inherent user privacy enables a private conversation between authorized users without revealing their real identities. While deniability allows authorized users to later deny their participating in conversations. However, deniability of secret handshakes lacks a comprehensive treatment in the literature. In this paper, we investigate the deniability of existing secret handshakes. We …


Privacy-Preserving Biometric-Based Remote User Authentication With Leakage Resilience, Yangguang Tian, Yingjiu Li, Rongmao Chen, Ximeng Liu, Bing Chang, Xingjie Yu Aug 2018

Privacy-Preserving Biometric-Based Remote User Authentication With Leakage Resilience, Yangguang Tian, Yingjiu Li, Rongmao Chen, Ximeng Liu, Bing Chang, Xingjie Yu

Research Collection School Of Computing and Information Systems

Biometric-based remote user authentication is a useful primitive that allows an authorized user to authenticate to a remote server using his biometrics. Leakage attacks, such as side-channel attacks, allow an attacker to learn partial knowledge of secrets (e.g., biometrics) stored on any physical medium. Leakage attacks can be potentially launched to any existing biometric-based remote user authentication systems. Furthermore, applying plain biometrics is an efficient and straightforward approach when designing remote user authentication schemes. However, this approach jeopardises user’s biometrics privacy. To address these issues, we propose a novel leakage-resilient and privacy-preserving biometric-based remote user authentication framework, such that registered …