0% found this document useful (0 votes)
2 views14 pages

Cryptography 08 00003

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 14

cryptography

Article
Novel and Efficient Privacy-Preserving Continuous Authentication
Ahmed Fraz Baig 1,2, *, Sigurd Eskeland 1 and Bian Yang 2

1 Norwegian Computing Center, 0314 Oslo, Norway; sigurd@nr.no


2 Department of Information Security and Communication Technology, Norwegian University of Science and
Technology, 2815 Gjøvik, Norway; bian.yang@ntnu.no
* Correspondence: baig@nr.no

Abstract: Continuous authentication enhances security by re-verifying a user’s validity during


the active session. It utilizes data about users’ behavioral actions and contextual information to
authenticate them continuously. Such data contain information about user-sensitive attributes such
as gender, age, contextual information, and may also provide information about the user’s emotional
states. The collection and processing of sensitive data cause privacy concerns. In this paper, we
propose two efficient protocols that enable privacy-preserving continuous authentication. The
contribution is to prevent the disclosure of user-sensitive attributes using partial homomorphic
cryptographic primitives and reveal only the aggregated result without the explicit use of decryption.
The protocols complete an authentication decision in a single unidirectional transmission and have
very low communication and computation costs with no degradation in biometric performance.

Keywords: cryptographic protocols; homomorphic encryption; continuous authentication; privacy;


biometrics

1. Introduction
Computing technology is growing rapidly; mobile devices are now commonly used for
different applications and services. The rapid advancement of technology also invites vari-
ous security threats in different domains. Security breaches, including unauthorized access
to user accounts, malware attacks, insider attacks, brute-force attacks, etc., are happening
Citation: Baig, A.F.; Eskeland, S.;
Yang, B. Novel and Efficient
every day. Authentication is considered a fundamental aspect of digital security; it ensures
Privacy-Preserving Continuous
whether the identity claimer is the right person or not. Verifying user identity with a weak
Authentication. Cryptography 2024, 8, authentication mechanism is one of the reasons for such security breaches. User authentica-
3. https://doi.org/10.3390/ tion is usually accomplished in a static way, where the user is authenticated only once at
cryptography8010003 the beginning of a session. Security problems likely occur when the PINs/passwords are
stolen, or the device remains unattended for a while and somebody else uses it. To reduce
Academic Editor: Josef Pieprzyk
security vulnerabilities, a second-factor authentication may be employed so that the user
Received: 12 December 2023 validity can be verified persistently. In this regard, continuous authentication may help to
Revised: 15 January 2024 prevent unauthorized access by continuously authenticating the user during the session.
Accepted: 17 January 2024 It can be accomplished by collecting and monitoring user contextual information such as
Published: 24 January 2024 user physical location by GPS, logical location IP addresses, etc., or authenticating users
using their behavioral traits.
Both behavioral biometrics and context-aware modalities offer passive and seam-
less authentication; therefore, they do not reduce usability. But, sometimes, they may
Copyright: © 2024 by the authors.
face problems, and to address such problems, one should carefully choose the mode of
Licensee MDPI, Basel, Switzerland.
continuous authentication. Different modalities solve different problems; for example,
This article is an open access article
monitoring users by their location data, IP addresses, or other context-aware data only
distributed under the terms and
enhances security when an attacker tries to breach security from a different place with
conditions of the Creative Commons
different devices, etc. Still, the limitation of this particular mechanism is that it gives no
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
protection when the user leaves the device unattended and an imposter uses it. Behavioral
4.0/).
biometric modalities may overcome this problem because users are authenticated based

Cryptography 2024, 8, 3. https://doi.org/10.3390/cryptography8010003 https://www.mdpi.com/journal/cryptography


Cryptography 2024, 8, 3 2 of 14

on the behavioral patterns they perform while using a device [1]. The limitation can be
overcome because the imposter can be identified immediately. In this regard, keystroke
dynamics or swipe gestures are the most suitable modes for continuous authentication.
Continuous authentication may have different applications, such as it can be used to
secure mobile devices, financial services, IoT and smart homes, E-commerce, healthcare,
cloud-based services, etc. Continuous authentication for such applications is also crucial
because it requires outsourcing user data. Continuous authentication can be performed
locally in the device, but devices have limited storage and computation resources, and there
is a possibility of malicious or compromised client [2,3].
Continuous authentication modalities use user behavioral data such as keystroke
patterns, swipe gestures, gait dynamics, and contextual data, including user location data,
IP addresses, carrier data, user calendars, Bluetooth connectivity, or other personal data [1].
Such data are enormous and contain sensitive information about the user’s appearance,
biometric information, and other user-sensitive and demographic information that may
be induced from such features [4]. Outsourcing such personal data to a third party raises
privacy concerns. These data contain biometric traits and contain identifiable and sensitive
attributes. As per GDPR [5,6], these data must be stored and processed in a privacy-
preserving manner.
Efficiency is another important concern in continuous authentication that requires
attention. Continuous authentication works actively throughout the session; therefore, it
requires low transmission overhead and efficient performance. The privacy-preserving
continuous authentication protocols in the literature are either very inefficient [7,8] or
proven insecure in [9]. For instance, in most cases, the authentication decision is made by
performing many rounds of interaction between the client and the authentication server.
This causes communication and computation overhead, as mentioned in the later Section 8.
Our contribution
To solve privacy and efficiency issues, this article makes the following contributions:
1. Using the additive homomorphic encryption property, we propose two efficient proto-
cols that protect the privacy of user behavioral features (enrollment vector and probe
vector). Protocol 1 assumes an honest client and a malicious authentication server,
and protocol 2 assumes a compromised client and malicious authentication server.
2. Low communication and computation costs. Taking high communication and
computation costs into consideration, we propose very efficient authentication
protocols that avoid rounds of communication between the client and the authenti-
cation server; the protocols complete the authentication in a single unidirectional
(client/server) transmission.
3. The biometric performance (accuracy) of the proposed protocols is the same as is in
the plaintext domain. In other words, there is no degradation in accuracy.
The rest of the paper is organized as follows: we discuss the related work in Section 2; the
preliminaries are discussed in Section 3; the adversarial model is presented in
Section 5; security requirements are discussed in Section 5.4; privacy-preserving protocol 1
is presented in Section 6; an extended protocol, taking a compromised client into account,
is presented in Section 7; computation cost and communication is assessed in Section 8;
a biometric evaluation is shown in Section 9; and Section 10 concludes the paper and
discusses the future work.

2. Related Work
This section presents the literature review of privacy-preserving continuous authen-
tication schemes. We only consider privacy-preserving solutions that utilize only cryp-
tographic primitives to achieve privacy. Govindarajan et al. [7] proposed protocols for
privacy-preserving continuous authentication. They use additive homomorphic encryption
and computed encrypted Scaled Euclidean Distance (SED) and Scaled Manhattan Distance
(SMD) to determine the dissimilarity between a reference template and a fresh input probe.
Cryptography 2024, 8, 3 3 of 14

Safa et al. [10] proposed a generic implicit authentication scheme for contextual data.
They used additive homomorphic encryption accompanied by order-preserving symmetric
encryption. The final result is based on the dissimilarity scores of Average Absolute Devia-
tion (AAD) between the enrollment and probe vector. Domingo-Ferrer et al. [11] presented
an implicit authentication protocol using an additively homomorphic encryption primitive
and computed a private set intersection between a set of enrollment features and a set of
probes. Sitová et al. [8] used the idea of a fuzzy commitment scheme proposed by Juels
and Wattenberg [12] to propose a touch dynamics-based authentication scheme. However,
such techniques face certain limitations related to data reversibility and data distinguisha-
bility and do not achieve privacy [13]. Balagani et al. [14] presented privacy-preserving
keystroke dynamics-based protocols for implicit authentication. Like Govindarajan et al.,
they also used additive homomorphic with a secure comparison protocol presented by
Damgård et al. [15,16].
Acar et al. [17] proposed a second-factor hybrid privacy-preserving authentication
protocol using keystroke dynamics. Their multi-factor authentication mechanism uses two
types of cryptographic primitives: fully homomorphic encryption (FHE) [18] and fuzzy
hashing [19].
Wei et al. [20] proposed a privacy-preserving continuous authentication protocol using
the Paillier cryptosystem. The cosine similarity is used to determine the similarity between
the encrypted reference template and the probe. The enrollment features are encrypted
using the public key of the authentication server, and privacy is achieved using secret
random numbers (secret key), such as each element is blinded with a secret blinding factor
that is only known to the client. However, it is shown by Eskeland and Baig [9] that the
Wei et al. scheme is insecure and not privacy preserving. They showed that the honest and
curious authentication server obtains not only the plaintext of biometric features, but also
the secret key vector. Moreover, they also showed that the Wei et al. scheme is vulnerable
to active adversarial attacks.
Loya and Bana [21] used fully homomorphic encryption proposed by Cheon et al. [22]
with differential privacy to propose a privacy-preserving protocol for keystroke analy-
sis. Their solution trains neural networks utilizing differential privacy and evaluates the
encrypted data.
Baig and Eskeland [23] proposed a privacy-preserving keystroke dynamics-based con-
tinuous authentication that computes penalty and reward functions defined by Bours [24].
Their privacy-preserving solution uses additive homomorphic encryption with a secure
comparison protocol and completes authentication in five rounds.
Baig et al. [25] utilized an oblivious transfer protocol (OT) with homomorphic en-
cryption to propose two privacy-preserving continuous authentication protocols. Their
proposed protocols protect user biometric data and user activities and complete authentica-
tion in four rounds. Their proposed protocols provide communication efficiency as they
compute similarity based on k actions and make interaction after k actions.

3. Preliminaries
This section discusses the building blocks.

Building Blocks
Our privacy-preserving continuous authentication protocols use the following build-
ing blocks:
(a) The Paillier cryptosystem [26,27] can be explained as follows: During a key generation
phase, two large random prime numbers p, q of equal length are selected and RSA product
n = pq is computed.The public and private keys are generated, of which (n, g) is the public
key, where g = 1 + n, and (λ, n) is the private key, where λ = λ(n) = lcm( p − 1, q − 1),
respectively. Encryption is performed as c = (1 + mn)r n mod n2 , where r is chosen ran-
domly in 0 < r < n. Decryption is performed as m = L(cλ mod n2 ) · λ−1 mod n, where L
is a function L( x ) = x− 1
n .
Cryptography 2024, 8, 3 4 of 14

Homomorphic encryption schemes enable the algebraic plaintext computations in the


encrypted domain. The Paillier cryptosystem supports the following homomorphic proper-
ties: E( x1 ) · E( x2 ) = E( x1 + x2 ) and scalar multiplication can be stated as E( x )k = E(k · x ),
where notation E( x ) represents the encryption of x. The notation is presented in Table 1.

Table 1. Notation.

⃗x Reference feature vector ⃗y Probe vector


⃗c Encrypted reference feature vector d⃗ Encrypted probe
C Client AS Authentication server
λ AS private key-pair n, g AS public key-pair

(b) The cosine similarity. Assume ⃗x = ( x1 , . . . , xm ) and ⃗y = (y1 , . . . , ym ) are two vectors,
where the cosine similarity between (⃗x, ⃗y) is defined as

∑mj =1 x j y j
cos(⃗x, ⃗y) = q q (1)
∑m x
j =1 j
2
∑m 2
j =1 y j

The cosine similarity of 1 indicates that vector ⃗x and vector ⃗y are exactly similar, where 0
indicates complete dissimilarity between two vectors.

4. Generic Continuous Authentication Algorithm Based on Cosine Similarity


User authentication is accomplished in two phases: an enrollment phase and an
authentication phase. A generic authentication scenario is presented in Algorithm 1. In
the enrollment phase, biometric features ⃗a = ( a1 , . . . , am ) are sampled, and in accordance
with the cosine similarity,
q a reference feature vector (template) ⃗x = ( x1 , . . . , xm ) is created
by computing A = ∑m 2
j=1 a j , where x j = a j /A, 1 ≤ j ≤ m.

Algorithm 1
Enrollment phase
⃗a = (q
a1 , . . . , a m )
A = ∑m j =1 a j
2

x = a j /A, 1 ≤ j ≤ m
⃗x = ( x1 , . . . , xm )

Authentication phase
⃗b = (b1 , . . . , bm )
q
B = ∑m j =1 b j
2

y = b j /B, 1 ≤ j ≤ m
⃗y = (y1 , . . . , ym )

s = ∑m j =1 x j y j
if (s > T ) then
Accept
end if

Authentication
q features ⃗b = (b1 , . . . , bm ) are sampled in the authentication phase,
m 2
where B = ∑ j=1 b j , y j = b j /B, 1 ≤ j ≤ m, are precomputed in the same way as stated
above to construct the probe vector ⃗y = (y1 , . . . , ym ), where m indicates the total elements
in a vector. The cosine similarity s between the template vector ⃗x and the probe vector ⃗y is
computed as a dot product:
Cryptography 2024, 8, 3 5 of 14

m
s = ⃗x · ⃗y = ∑ xj yj (2)
j =1

Finally, to make an authentication decision, s is compared to a predefined threshold τ.


If s > τ is true, then the user is accepted.

5. Adversarial Model
Different types of adversaries are considered in biometric authentication systems,
such as malicious parties, semi-honest parties, etc.; malicious parties are considered strong
adversaries, whereas semi-honest parties follow the protocol honestly. The protocols
presented in the later sections do not take external adversaries into account and assume
that communication between the user and the server is secure and that external threats,
such as replay attacks and other similar attacks, are mitigated by applying other security
techniques. Note that the enrollment phase is completed in a trusted environment. The
proposed authentication protocols consider the following adversaries.

5.1. Trusted Client


A trusted client in a biometric system is considered fully reliable and honest. In this
regard, Protocol 1 assumes that the client’s device is secure and that the client is trusted
and honestly follows the protocol, and the trusted client is not even curious about the
protocol working.

5.2. Malicious Authentication Server


The malicious parties may deviate from the protocol and may act as an active adversary.
We assume the authentication server is a malicious party and may deviate from the protocol.
The goals of a malicious authentication server may include attempting to learn the stored
enrollment data or authentication features by any means. The malicious AS may send false
messages to the client to extract additional information [28].

5.3. Malicious Client


A malicious client is a type of adversary that may also deviate from the protocol. This
type of adversary may try to learn enrollment data or may forge the biometric data and try
to gain unauthorized access. In the extended protocol, protocol 2, we assume that the client
is malicious and can deviate from the protocol [28].

5.4. Security Requirements


To preserve the privacy of biometric features, we assume that a privacy-preserving
protocol fulfills the following privacy requirements (PR):
• PR1: The authentication server must not learn the reference features stored during the
enrollment phase.
• PR2: The authentication server must not learn the probe during the authentication
phase.
• PR3: The authentication server should only learn the outcome but nothing more.
• PR4: The identity claimer should not learn the enrollment feature vector.

6. The Novel Privacy-Preserving Authentication Protocol


In this section, we propose a novel privacy-preserving authentication protocol that
protects the enrollment feature vector and the probe vector. It consists of three phases: A
setup phase, an enrollment phase, and an authentication phase. The privacy-preserving
protocol is shown in Figure 1.

6.1. Setup Phase


The authentication server ( AS) generates a Paillier public key ( g, n), that is shared
with the client (C ).
Cryptography 2024, 8, 3 6 of 14

6.2. Enrollment Phase


During the enrollment phase, C is registered to AS by providing reference biometric
features (template) in a privacy-preserving way.
This phase samples biometric features as ⃗a = ( a1 , . . . , am ) and prepares the template
vector ⃗x = ( x1 , . . . , xm ), in accordance with the cosine similarity, as stated in Section 4.
C randomly selects a vector ⃗r and computes c j = gr j (1 + x j n) mod n2 , where the secret
encryption factor gr j is an element in Zn∗2 , 1 ≤ j ≤ m. Note that the encryption factor
gr j is computed differently from the Paillier encryption scheme. The encryption factor
gr j is removed using α and β in the authentication phase without a private key while the
enrollment features remain protected. C computes an encrypted reference template vector
⃗c = (c1 , . . . , cm ) and sends ⃗c to AS. AS stores the encrypted reference template ⃗c, and C
stores (⃗x, ⃗r ) locally.

Client C Authentication server AS


Enrollment phase
⃗a = (q a1 , . . . , a m )
A = ∑m j =1 a j
2

x j = a j /A, 1 ≤ j ≤ m
⃗x = ( x1 , . . . , xm )
Generate:
⃗r = (r1 , . . . , rm )
Compute:
c j = gr j (1 + x j n) mod n2 ,
1≤j≤m
⃗c = (c1 , . . . , cm ) ⃗c
−−−−−−−−−−−−−

store: ⃗x, ⃗r

Authentication phase
retrieve ⃗r, ⃗x Retrieve ⃗c
⃗b = (b1 , . . . , bm )
q
B = ∑m j =1 b j
2

y j = b j /B, 1 ≤ j ≤ m
k j ∈ Z∗n
dj = yj + k j, 1 ≤ j ≤ m
d⃗ = (d1 , . . . , dm )
− m rd
α = g ∑ j=1 j j mod n2
β = ∑m j=1 x j k j mod n
2 α, β, d⃗
−−−−−−−−−−−−−→
dj
s = α(∏m
j=1 c j ) − βn
s>τ

Figure 1. Privacy-preserving authentication protocol.

6.3. Authentication Phase


During the authentication phase, the similarity between the probe and the reference
template is determined. The probe
q vector ⃗b = (b1 , . . . , bm ) is sampled for each behavioral
action, and C computes B = ∑m 2
j=1 b j and y j = b j /B, 1 ≤ j ≤ m in accordance with the
cosine similarity.
C randomly chooses k j ∈ Z∗n for blinding the probe elements as d j = y j + k j , 1 ≤ j ≤ m,
where d⃗ = (d1 , . . . , dm ). C retrieves the reference enrollment template ⃗x and secret vector ⃗r,
and computes
Cryptography 2024, 8, 3 7 of 14

− ∑m
j =1 r j d j
α=g mod n2
and
m
β= ∑ xj k j mod n2
j =1

α and β are computed for subsequent elimination of the encryption factors gr j of c j and k j
of d j , such that AS obtains only the result of dot product s (Equation (2)), but learns nothing
about (⃗x, ⃗y, ⃗r, ⃗k).
C sends an authentication request message (α, β, d⃗) to the AS for the authentication.
Upon receiving (α, β, d⃗) from C, AS retrieves encrypted reference template ⃗c and computes
m
dj
S = α ∏ c j − βn (3)
j =1

The correctness can be verified as


m
dj
S =α ∏ c j − βn mod n2
j =1
m
=α ∏ ( gr j (1 + x j n))d j − βn mod n2
j =1
m
=α ∏ gr j d j (1 + x j d j n) − βn mod n2
j =1
m m
=α ∏ gr j d j ∏ (1 + x j y j n + x j k j n) − βn mod n2
j =1 j =1
m
(4)
=αα−1 ∏ (1 + x j (y j + k j )n) − βn mod n2
j =1
m m
=1 + n ∑ x j y j + n ∑ x j k j − βn mod n2
j =1 j =1
m
=1 + n ∑ x j y j + βn − βn mod n2
j =1
m
=1 + n ∑ x j y j mod n2
j =1

=1 + sn
S −1
Finally, the dot product s = L(S) = n = ∑m
j=1 xi yi is restored. AS checks s > τ. If this is
true, then AS accepts the request.

6.4. Security Analysis


Note that protocol 1 does not deal with the malicious client (privacy requirement 4
PR4). The proposed protocol fulfills the privacy requirements mentioned in Section 5.4
as follows:
PR1. The authentication server must not learn the reference feature vector ⃗x stored during the
enrollment phase.
The client sends ⃗c to the authentication server during the enrollment phase, and the
elements of the reference template vector ⃗c are created as c j = gr j (1 + x j n), 1 ≤ j ≤ m. Each
element x j is protected with gr j , which is randomly chosen. As x j and gr j are unknown to
the adversary, it is hard to determine x j .
Cryptography 2024, 8, 3 8 of 14

m
⃗ α, β). Since α = g− ∑ j=1 r j d j , β = ∑m x j k j , are aggregated
AS has knowledge of (⃗c, d, j =1
values, they do not reveal information about the elements of (⃗x, ⃗y,⃗r ).
PR2. The authentication server must not learn the probe vector ⃗y during the authentication phase.
In the authentication phase, C blinds each element of the probe vector ⃗y as d j = y j + k j ,
1 ≤ j ≤ m, with a secret random integer k j ∈ Z∗n . Due to the blinding, it is impossible to
⃗ However, k j , 1 ≤ j ≤ m, occur in the computation of the dot
determine y j or k j from d.
m
product β = ∑ j=1 x j k j mod n2 . Thus, no information about ⃗y from β could be learned.
PR3. The authentication server should only learn the outcome but nothing more.
The reference template vector and probe vector are blinded by the mean of random
secret elements (⃗r, ⃗k ), which are canceled out by means of α and β in a privacy-persevering
way. AS can only see the final result of the dot product, which is the cosine similarity
between the probe and the reference template.

7. Extended Scheme w.r.t a Malicious Client


The privacy-preserving scheme in Section 6 requires that the enrollment template
vector ⃗x and the random vector ⃗r are stored unprotected in the device. Considering that the
client is a malicious adversary who can potentially obtain access to the enrollment template
vector ⃗x. To deal with this problem, we extend the previous protocol w.r.t protecting the
enrollment template vector ⃗x. The extended protocol is presented in Figure 2 and solves.

7.1. Setup Phase


The authentication server shares the public key with the client C and keeps λ secret,
as stated in Section 6.1.

7.2. Enrollment Phase


During this phase, C prepares an encrypted reference template ⃗c in the same way as
stated in Section 6.2. C randomly selects a vector ⃗r, where gr j is an element in Zn∗2 and
blinds each element of ⃗x as c j = gr j (1 + x j n) mod n2 . Note that the encryption factor gr j is
computed differently from the Paillier encryption scheme, as stated in protocol 1. C sends ⃗c
to AS. C stores ⃗r = (r1 , . . . , rm ) locally in the device.
To protect the reference template ⃗x, each element is encrypted using an AS public key
in agreement with the Paillier cryptosystem. C randomly chooses r ′j ∈ Z∗n and computes the
Paillier encryption c′j = r ′jn (1 + x j n) mod n2 , 1 ≤ j ≤ m, and stores the encrypted vector
⃗c′ = (c′ , . . . , c′m ) locally.
1

7.3. Authentication Phase


The probe vector ⃗b = (b1 , . . . , bm ) is sampled and C randomly chooses k j ∈ Z∗n
for blinding the probe elements as d j = y j + k j , 1 ≤ j ≤ m, where d⃗ = (d1 , . . . , dm ),
m
and computes α = g ∑ j=1 j j mod n2 in the same way as in Section 6.3. C computes
− rd

γ = ∏m ′ k j mod n2 , where k ∈ Z∗ is an element of random vector ⃗k, which is also used


j =1 c j j n
⃗ ⃗
in d. C sends (α, γ, d) to the AS for the authentication.
Cryptography 2024, 8, 3 9 of 14

Client C Authentication server


AS (λ)
Enrollment phase
⃗a = (qa1 , . . . , a m )
A = ∑m j =1 a j
2

x j = a j /A, 1 ≤ j ≤ m
Generate:
⃗r = (r1 , . . . , rm )
Compute:
c j = gr j (1 + x j n) mod n2
⃗c = (c1 , . . . , cm )
⃗c
−−−−−−−−−−−−−

Store ⃗c
Select: r ′j ∈ Z∗n
n
c′j = r ′j (1 + x j n) mod n2
⃗c′ = (c′ , . . . , c′m )
1
store: ⃗c′ , ⃗r

Authentication phase
Retrieve: ⃗c′ , ⃗r Retrieve ⃗c
⃗b = (b1 , . . . , bm )
q
B = ∑m j =1 b j
2

y j = b j /B, 1 ≤ j ≤ m
⃗y = (y1 , . . . , ym )
k j ∈ Z∗n
⃗k = (k1 , . . . , k m )
dj = yj + k j, 1 ≤ j ≤ m
d⃗ = (d1 , . . . , dm )
− m rd
α = g ∑ j=1 j j mod n2
γ = ∏m ′ k j mod n2 α, γ, d⃗
j =1 c j −−−−−−−−−−−−−→
γ′ = γλ mod n2
β = L(γ′ )
dj
s = α ∏m
j=1 c j − βn
mod n2
s>τ

Figure 2. Extended privacy-preserving authentication protocol.

Upon receiving the message from C, AS first decrypts γ in agreement with the Paillier
cryptosystem by first computing
m
∏ c′j
kj λ
γ′ =γλ = mod n2
j =1
m
= ∏ r ′j
k j λn
(1 + x j n ) k j λ mod n2
j =1
m
(5)
= ∏ 1 + x j k j λn mod n 2
j =1
m
=1 + nλ ∑ x j k j mod n2
j =1
Cryptography 2024, 8, 3 10 of 14

k j λn
where r ′j ≡ 1 mod n2 , AS restores
m
β = L ( γ ′ ) · λ −1 mod n = ∑ xj k j
j =1

which is same as β, as stated in the Section 6.3,


After that, AS retrieves the encrypted template ⃗c and computes
m
dj
S = α ∏ c j − βn
j =1

The correctness is in agreement with Equation (4).


The dot product s = L(S) = S− 1 m
n = ∑ j=1 xi yi is restored. AS verifies whether s > τ is
true, then C is accepted.

7.4. Security Analysis


This section presents the security analysis of PR4; the rest of the privacy requirements
(PR1, PR2, and PR3) are in agreement with the security analysis presented in Section 6.4.
Since both protocols do not send anything back to the client, the malicious AS cannot send
any false messages to the client. Any message from AS will considered as a false message.
PR4. The identity claimer should not learn the enrollment feature vector
The device stores the encrypted reference template vector ⃗c′ by the public key of AS;
due to that, C cannot access the unencrypted reference template vector. Hence, if the device
gets compromised, the adversary cannot access ⃗x. Moreover, C sends the blinded probe to
AS, where AS determines the similarity between the encrypted reference template and the
blinded probe in a privacy-preserving way without a second interaction.

8. Computation Cost Analysis and Comparison


The computation and communication efficiency of the proposed protocol are deter-
mined by comparing them with the existing protocols proposed in a similar domain. We
analyze the computation cost of encrypted operations, the number of rounds required to
complete the authentication decision, and the transmitted encryptions in each transmission.
The proposed protocols complete an authentication decision in a single unidirectional
transmission between the client (C ) and the authentication server ( AS). C blinds each
element of the probe vector and sends it the AS. Using a homomorphic property, AS
computes m scalar products.
The abbreviations used in Table 2 are denoted as SE: Symmetric encryption, PSI:
Private set intersection, OPE: Order preserving encryption, and OT: Oblivious transfer
protocol.

Table 2. Complexity comparison.

Number of Cryptographic
Protocol Number of Rounds
Encryptions Primitives
Safa et al. [10] 3 3m Paillier + OPE
Domingo-Ferrer et al. [11] 2 2m Paillier, PSI
Paillier Threshold
Baig et al. [25] 4 km + 4
Decryption + OT
Proposed protocol (s) 1 m+2 Modified Paillier

The protocol proposed by Govindarajan et al. [7] completes the authentication decision
by performing four round transmissions between the client and the server, whereas in the
first transmission, a vector of the m encrypted element is transmitted to the client. Then,
the client and the server invoke the privacy-preserving comparison protocol proposed
Cryptography 2024, 8, 3 11 of 14

by Damgård et al. [15,16] to compute the Scaled Manhattan Distance. Note that the
Damgård et al. [15,16] protocol compares integers in privacy-preserving manners without
compromising their confidentiality. They computed the Squared Euclidean distance based
on the Erkin et al. protocol [29]. Due to computational and communication inefficiencies of
the sub-protocol proposed by Damgård et al. [15,16], the Govindarajan et al. protocols [7,14]
are very inefficient.
The Wei et al. protocol [20] completes an authentication decision by making three
rounds of transmissions between the client and the server. In each interaction, m encrypted
elements are transmitted. Each party computes m scalar multiplication in each interaction.
The Baig et al. [25] protocols complete the authentication decision for k activities in four
rounds. Other means of continuous authentication, such as utilizing user physical location
data, cookies, IP addresses, etc., proposed in [10,11,30], are also very inefficient. Domingo-
Ferrer et al. [11] protocol takes two rounds, where each round sends an encryption of m
elements. Similarly, Shahandashti et al. [30] protocol also takes three rounds to complete
the authentication decision, and each round transmits m encryptions.
In comparison to the protocols in [7,20,23,25], our proposed protocols are very efficient
in terms of computation cost and communication costs.
Considering the scenario of continuous authentication, the authentication decision
is made periodically, such as instead of making the authentication decision based on a
single behavioral action, it should be decided on the basis of more than one action, such as
(k) actions; for such scenarios, the protocols in [7,20] take 4k, 3k interactions, respectively.
Meanwhile, for k actions, our protocols require only k round transmissions. The comparison
is presented in Table 2.

9. Performance Evaluation
To analyze the performance of the proposed protocols, we perform the biometric
analysis of the proposed protocols and determine the running time in milliseconds (ms).

9.1. Biometric Evaluation


Table 3 presents the biometric analysis of the proposed protocols. To determine the
biometric performance of the proposed protocols, we used a publicly available dataset [4]
(Available at: https://www.ms.sapientia.ro/~manyi/bioident.html, accessed on 15 June
2023) to evaluate the biometric performance. The touch gestures data are collected from
51 participants, 42 male and 9 female. A swipe gesture contains the following feature
elements [4]:
“stroke-duration, start-x, start-y, stop-x, stop-y, direct-end-to-end-distance, mean-resultant-
length, up-down-left-right-flag, direction-of-end-to-end line, largest-deviation-from-end-
to-end-line, average-direction, length-of-trajectory, average-velocity, mid-stroke-pressure,
mid-stroke-area”.

Table 3. Biometric evaluation of the proposed protocols.

T FNMR FMR EER


0.90 0.247 0.334 0.291
0.91 0.275 0.282 0.279
0.92 0.313 0.236 0.274
0.93 0.355 0.198 0.277
0.94 0.396 0.165 0.281
0.95 0.423 0.138 0.280
0.96 0.462 0.109 0.286

Each user provides l samples in different sessions and on different devices. The
biometric performance is analyzed by determining the false match rate (FMR), false non-
match rate (FNMR), and equal error rate (EER). We randomly select one sample and make
it a reference template. For each user, a template is created by following the steps stated in
Cryptography 2024, 8, 3 12 of 14

the enrollment phase of proposed protocols; for example, we created 51 reference templates
(one for each user). The rest of the l − 1 samples are utilized for the testing. FNMR
determines the similarity between the reference template and the remaining samples.
For FMR, we construct (l) imposter samples by choosing different samples from
different users. FMR is determined by computing the similarity between the reference
template of each user and the imposter samples. The similarity is computed by following
steps mentioned in the proposed protocols.
The performance on the blinded features is the same as the performance of the baseline
in the plaintext domain. We achieved different performances on different thresholds (T).
The lower threshold gives lower FNMR but also gives high FMR. The highest FNMR of
0.462 has been achieved on T = 0.96, whereas the lowest FNMR has been 0.275 on T = 0.91.
The best FNMR 0.275 and FMR 0.282 are achieved on T = 0.91. Note that the accuracy of
the proposed protocols is the same as without privacy presented in Algorithm 1. Adding
cryptography does not degrade the accuracy.

9.2. Running Time


The running time of the proposed protocols is measured on Intel(R) Core(TM) i5-
7440 HQ CPU@2.80 GHz, 32 GB RAM in Python 3.10. The running time of the proposed
protocols is tested on different security levels (k = 112, 128, 192). The running time of the
proposed protocol 1 is shown in Figure 3a.

(a) Protocol 1

(b) Protocol 2

Figure 3. Running time of the proposed protocols.


Cryptography 2024, 8, 3 13 of 14

Figure 3b shows the running time of the proposed protocol, protocol 2; due to the
decryption, protocol 2 has a slightly higher running time than protocol 1. This analysis
does not include the communication costs.

10. Conclusions and Future Work


In this paper, we have proposed two efficient privacy-preserving continuous authenti-
cation protocols that protect user biometric features. The proposed protocol 1, provides
privacy protection under the malicious authentication server and honest client, and the pro-
posed protocol 2, considers malicious parties. The biometric evaluation on a publicly avail-
able dataset has shown that the proposed protocols have good performance. The privacy-
preserving protocols provide the same accuracy as without encryption. The proposed
protocols offer low communication and computation costs and complete authentication in
a single uni-directional transmission. Low costs overhead and good biometric performance
prove the practicality of the proposed protocols in real-life applications.
The proposed protocols can be utilized for continuous authentication as well as static
authentication, such as authentication using any biometrics or contextual modalities.
In future work, we will consider making the final comparison in a privacy-preserving way.

Author Contributions: Conceptualization, A.F.B. and S.E.; Methodology, A.F.B. and B.Y.; Validation,
A.F.B. and S.E.; Investigation, A.F.B., S.E. and B.Y.; Writing—original draft, A.F.B.; Writing—review &
editing, A.F.B.; Supervision, S.E. and B.Y. All authors have read and agreed to the published version
of the manuscript.
Funding: This work is part of the Privacy Matters (PriMa) project. The PriMa project has received
funding from European Union’s Horizon 2020 research and innovation programme under the Marie
Skłodowska-Curie grant agreement No. 860315.
Data Availability Statement: The data presented in this study are available in article.
Conflicts of Interest: The authors declare no conflict of interest.

References
1. Baig, A.F.; Eskeland, S. Security, Privacy, and Usability in Continuous Authentication: A Survey. Sensors 2021, 21, 5967. [CrossRef]
[PubMed]
2. Atanassov, N.; Chowdhury, M.M. Mobile device threat: Malware. In Proceedings of the 2021 IEEE International Conference on
Electro Information Technology (EIT), Mt. Pleasant, MI, USA, 14–15 May 2021; pp. 7–13.
3. Weichbroth, P.; Łysik, Ł. Mobile security: Threats and best practices. Mob. Inf. Syst. 2020, 2020, 8828078. [CrossRef]
4. Antal, M.; Bokor, Z.; Szabó, L.Z. Information revealed from scrolling interactions on mobile devices. Pattern Recognit. Lett. 2015,
56, 7–13. [CrossRef]
5. GDPR. Processing of Special Categories of Personal Data. 2021. Available online: https://gdpr-info.eu/art-9-gdpr/ (accessed
on 3 March 2023).
6. On the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data,
and Repealing Directive 95/46/EC (General Data Protection Regulation). 2016. Available online: https://eur-lex.europa.eu/
legal-content/EN/TXT/?uri=CELEX%3A02016R0679-20160504 (accessed on 14 January 2024).
7. Govindarajan, S.; Gasti, P.; Balagani, K.S. Secure privacy-preserving protocols for outsourcing continuous authentication of
smartphone users with touch data. In Proceedings of the 2013 IEEE Sixth International Conference on Biometrics: Theory,
Applications and Systems (BTAS), Arlington, VA, USA, 29 September–2 October 2013; pp. 1–8.
8. Sitová, Z.; Šeděnka, J.; Yang, Q.; Peng, G.; Zhou, G.; Gasti, P.; Balagani, K.S. HMOG: New behavioral biometric features for
continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 2015, 11, 877–892. [CrossRef]
9. Eskeland, S.; Baig, A.F. Cryptanalysis of a Privacy-preserving Behavior-oriented Authentication Scheme. In Proceedings
of the 19th International Conference on Security and Cryptography—SECRYPT 2022, Lisbon, Portugal, 11–13 July 2022;
pp. 299–304. [CrossRef]
10. Safa, N.A.; Safavi-Naini, R.; Shahandashti, S.F. Privacy-preserving implicit authentication. In Proceedings of the IFIP International
Information Security Conference, Marrakech, Morocco, 2–4 June 2014; pp. 471–484.
11. Domingo-Ferrer, J.; Wu, Q.; Blanco-Justicia, A. Flexible and robust privacy-preserving implicit authentication. In Proceedings of
the IFIP International Information Security and Privacy Conference, Hamburg, Germany, 26–28 May 2015; pp. 18–34.
12. Juels, A.; Wattenberg, M. A fuzzy commitment scheme. In Proceedings of the 6th ACM Conference on Computer and
Communications Security, Singapore, 1–4 November 1999; pp. 28–36.
Cryptography 2024, 8, 3 14 of 14

13. Bringer, J.; Chabanne, H.; Patey, A. Privacy-preserving biometric identification using secure multiparty computation: An
overview and recent trends. IEEE Signal Process. Mag. 2013, 30, 42–52. [CrossRef]
14. Balagani, K.S.; Gasti, P.; Elliott, A.; Richardson, A.; O’Neal, M. The impact of application context on privacy and performance of
keystroke authentication systems. J. Comput. Secur. 2018, 26, 543–556. [CrossRef]
15. Damgård, I.; Geisler, M.; Krøigaard, M. Efficient and secure comparison for on-line auctions. In Proceedings of the Australasian
Conference on Information Security and Privacy, Townsville, Australia, 2–4 July 2007; pp. 416–430.
16. Damgård, I.; Geisler, M.; Krøigard, M. A correction to ‘Efficient and secure comparison for on-line auctions’. Int. J. Appl. Cryptogr.
2009, 1, 323–324. [CrossRef]
17. Acar, A.; Liu, W.; Beyah, R.; Akkaya, K.; Uluagac, A.S. A privacy-preserving multifactor authentication system. Secur. Priv. 2019,
2, e88.
18. Gentry, C. A Fully Homomorphic Encryption Scheme; Stanford University: Stanford, CA, USA, 2009.
19. Kornblum, J. Identifying almost identical files using context triggered piecewise hashing. Digit. Investig. 2006, 3, 91–97. [CrossRef]
20. Wei, F.; Vijayakumar, P.; Kumar, N.; Zhang, R.; Cheng, Q. Privacy-Preserving Implicit Authentication Protocol Using Cosine
Similarity for Internet of Things. IEEE Internet Things J. 2020, 8, 5599–5606. [CrossRef]
21. Loya, J.; Bana, T. Privacy-Preserving Keystroke Analysis using Fully Homomorphic Encryption & Differential Privacy. In
Proceedings of the 2021 International Conference on Cyberworlds (CW), Caen, France, 28–30 September 2021; pp. 291–294.
22. Cheon, J.H.; Kim, A.; Kim, M.; Song, Y. Homomorphic encryption for arithmetic of approximate numbers. In Advances in
Cryptology–ASIACRYPT 2017, Proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and
Information Security, Hong Kong, China, 3–7 December 2017; Proceedings, Part I 23; Springer: Berlin/Heidelberg, Germany, 2017;
pp. 409–437.
23. Baig, A.F.; Eskeland, S. A Generic Privacy-Preserving Protocol For Keystroke Dynamics-Based Continuous Authentication. In
Proceedings of the 19th International Conference on Security and Cryptography—SECRYPT 2022, Lisbon, Portugal, 11–13 July
2022; pp. 491–498. [CrossRef]
24. Bours, P. Continuous keystroke dynamics: A different perspective towards biometric evaluation. Inf. Secur. Tech. Rep. 2012,
17, 36–43. [CrossRef]
25. Baig, A.F.; Eskeland, S.; Yang, B. Privacy-preserving continuous authentication using behavioral biometrics. Int. J. Inf. Secur. 2023,
22, 1833–1847. [CrossRef]
26. Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the International
Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, 2–6 May 1999; pp. 223–238.
27. Damgård, I.; Jurik, M. A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In
Public Key Cryptography, Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001,
Cheju Island, Republic of Korea, 13–15 February 2001; Proceedings 4; Springer: Berlin/Heidelberg, Germany, 2001; pp. 119–136.
28. Simoens, K.; Bringer, J.; Chabanne, H.; Seys, S. A framework for analyzing template security and privacy in biometric
authentication systems. IEEE Trans. Inf. Forensics Secur. 2012, 7, 833–841. [CrossRef]
29. Erkin, Z.; Franz, M.; Guajardo, J.; Katzenbeisser, S.; Lagendijk, I.; Toft, T. Privacy-preserving face recognition. In Proceedings of
the International Symposium on Privacy Enhancing Technologies Symposium, Seattle, WA, USA, 5–7 August 2009; pp. 235–253.
30. Shahandashti, S.F.; Safavi-Naini, R.; Safa, N.A. Reconciling user privacy and implicit authentication for mobile devices. Comput.
Secur. 2015, 53, 215–233. [CrossRef]

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.

You might also like