† Corresponding author. E-mail:
With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification.
With the continuous development of biological technologies and artificial intelligence, fingerprint identification technology has been commonly used by the public. Compared with the traditional identity authentication methods using passwords or character string, the usage of fingerprint identification is simple, convenient, and without having to make extra efforts in memorizing, because only with the scanning of the user’s finger over the sensor, the identity authentication process will be completed. However, the biological technology does not equal to absolute security and it also has several intrinsic problems. For example, the original feature data of the fingerprint (called ‘minutiae’) are usually stored in the database of servers, if the database is compromised, all feature data from fingerprints will be exposed,[1] eavesdroppers, then, can restore the original fingerprint images by using these exposed and compromised minutiae. Therefore, it will never be secure once the original fingerprint images are compromised.
To overcome the mentioned problems, a technology called revocable biological template protection has been proposed.[2] This technology protects user’s security and privacy by using irreversible template transformation of minutiae. In the process of fingerprint identification, only the transformed template is used for authentication. By doing this, compromise and exposure of minutiae can be prevented. The advantage of this scheme is that a renewed irreversible transformed template will be generated from records of the same minutiae once the transformed template is exposed. In recent years, a fingerprint identification algorithm by exploiting biological features template protection technology has become a hot-spot, researchers have proposed various strategies to protect the biological features template, and these strategies can be categorized into two types:[3] (i) transformation of biological features[4–9] and (ii) the methods based on helper data.[10–15] However, these classical security schemes still have problems. For example, in the first type, bio-hashing of biological features[6] is proposed in which one can combine random number and fingerprint images to create the template. However, eavesdroppers can easily attack the system if he/she has obtained the identity token. Chulhan et al.[8] came up with an idea of reflecting the minutiae into a three-dimensional array and combining the personal PIN code to obtain a transformed bit string. This scheme still has weakness, once the PIN code is reset, the security of the system could be greatly reduced. For the second type, Yang et al.[13] proposed a Delaunay quadrangle-based fingerprint authentication system, which expands the Delaunay triangle-based structure proposed in Refs. [14] and [15]. The local Delaunay quadrangle-based structure has better structural stability than the Delaunay triangle-based structure and it is able to tolerate a certain extent of nonlinear distortion-induced structural change, but lots of parameters in this method need to be set which thus may lead to complexity and expenditure problems. Generally speaking, the two types of protection strategies both have intrinsic weaknesses, which to some degree causes security and privacy issues for the biological characteristics template.
By contrast with the above-mentioned classical methods, in the field of physics, meanwhile, quantum mechanics is a set of theories established at the beginning of 20th century.[16] After the development of a century, it has become one of the sub-disciplines of physics, which focuses on researching the movement pattern of micro-particles in the material world.[17] Quantum mechanics is not only one of the basic theories in modern physics, but also has wide applications in relevant disciplines (e.g., chemistry and cryptology) as well as many modern technologies.[18] Interestingly, the micro-particles have lots of strange properties which could provide new methods to solving the classical problem.[19,20] Inspired by distinct properties of quantum, Bennett and Brassard proposed a quantum method to solve the problem of key distribution; their research results were published as the well-known BB84 protocol,[21] which encodes information by exploiting the complementarity of two states of a linearly polarized photon (horizontal and vertical directions) and two states of a circularly polarized photon (levorotary and dextrorotary directions). This protocol has a profound impact on the discrete-variable quantum key distribution (DVQKD) area. For decades, researchers have put forward lots of improved DVQKD protocols. Meanwhile, the unconditional security proofs for this type of protocols have steadily improved and today unconditional security, namely, the security guaranteed in an information-theoretical sense, has been established for DVQKD protocols in both asymptotic limit[22] and finite-size regime.[23,24] Our quantum fingerprint templates protection scheme can be deemed as an application of the DVQKD protocol in fingerprint identification area. Thus, from this viewpoint, our scheme not only can well defend most specific attacks aimed at the fingerprint identification system, but also can defend the collective attacks which are the most powerful attacks to the DVQKD protocols.
In what follows, we detail the proposed novel cancelable remote quantum fingerprint templates protection scheme, which can theoretically guarantee the security and privacy of the fingerprint identification system. The organization of this paper is as follow. In Section
Details about quantum mechanics can be found in Ref. [17]. In this section, we only discuss several basic quantum properties related to the proposed scheme, and they are significant for the design of a quantum fingerprint recognition system.
In order to acquire the information encoded in quantum bit
For example, consider a basic quantum bit which could be
The property of imprecise measurement of quantum bit is determined by uncertainty principle. This speciality renders the quantum bit completely different from a classical bit.[25] For a classical bit, on which most cancelable fingerprint templates protection methods are based, it can be measured precisely under any situation. A classical binary bit only can be ‘1’ or ‘0’. However, for a quantum bit, it is impossible to obtain accurate information if improper measurement basis is chosen. The uncertainty principle is the quantum’s inherent nature. Although this property may cause some difficulties in quantum computing, it provides novel ideas in security communication area.
In quantum physics, the no-cloning theorem states that it is impossible to create an identical copy of an arbitrary unknown quantum state.
Suppose that a clone-wanted quantum state is arbitrary quantum bit
No-cloning theorem is an inherent property of quantum mechanics, which is as if one has set an insurmountable limitation. This theorem is one of the bases of quantum information science, which guarantees the security of quantum cryptogram and makes it impossible for an eavesdropper to acquire legal user information through clone technology.[26] Hence, it provides a qualitative safeguard for quantum fingerprint template protection scheme.
A basic quantum bit is made up of a single quanta, while the composited quantum bit is compounded by n quantum bits, which can be expressed as
There is a special kind of composited quantum bit, namely, the entangled state. Thereinto, EPR entangled pair is the most representative entangled quantum bit, which can be represented as follows:
In this section, we detail the remote quantum fingerprint templates protection scheme. This scheme encodes the traditional minutiae feature in quantum bits and utilizes inherent properties of quantum bit to ensure the system’s security and privacy. Therefore, this scheme not only can be deployed independently, but also adapt to most existing classical minutiae extraction algorithms. Meanwhile, we creatively propose the concept of quantum remote fingerprint verification, namely, the minutiae extraction device (client) and the fingerprint verification device (server) do not need to deploy at the same place, which could meet the demand of remote authority.
Although the proposed scheme does not involve concrete physical implementation, the complementarity of two states of linearly polarized photon
The states of linearly polarized photon and circularly polarized photon are conjugate states, which meet the uncertainty principle discussed in Section
We define an interconversion rule:
Our proposed scheme consists of two modules, one is a fingerprint extraction module (client) and the other is a fingerprint recognition module (server). The former module could be considered as a small portable device, and its main function is to extract and translate original fingerprint features (minutiae) and execute necessary communication with the server. The role of the latter module is similar to the cloud server in cloud computing technique, its main task is fingerprint identification. Having these two modules, users could fulfill various objectives such as remote authority, unlock, and recognition through scanning their fingerprints on portable micro devices. The security and privacy of telecommunication, which will be elaborated at Section
At the enrollment stage, a decision sequence and a measurement basis sequence are produced by the client and the server respectively for each registrant. The procedure of the enrollment stage is shown in Fig.
1) The client firstly produces a random decision sequence for each fingerprint and then transmits the sequence to the server’s database through a classical channel. This sequence is used to decide which interconversion rule is used to transform the presentation from classical bit to quantum bit. After that, a classical binary bit string, which is acquired by minutiae extract, is transformed to the corresponding quantum bit string. Meanwhile, the server prepares a set of EPR entangled pairs according to each single quantum bit in the quantum bit string mentioned above. For each EPR entangled pair, the server transmits one of its particle
2) The server randomly produces a measurement basis sequence, subsequently saves it in the database and transmits its copy to the client through classical channel. The client measures each particle
3) Generate a cancelable template using the decision sequence and measurement basis sequence. Note that the lengths of both types of sequences are fixed according to the original fingerprint features. Each type of sequence is formed randomly and independently, which means each of them be reformed without affecting the other. Here we use an example to illustrate the generation of cancelable template. As can be seen from Fig.
At this stage, the primary task of the system is to identify whether users are legitimate or not. For each enrolled record in the server database, the procedure of verification stage is illustrated in Fig.
1) The client prepares a set of EPR entangled pairs according to this record’s decision sequence and query fingerprint minutiae binary string. For each EPR entangled pair, the client transmits one of its particles
2) The server utilizes each measurement basis in this record’s measurement basis sequence to measure the corresponding quantum bit in
3) The final step of the verification stage is to match the query code and record’s encrypted key. Assume that
In this section, we elaborate the security analysis of the proposed cancelable remote quantum fingerprint templates protection scheme. The security of this scheme can be discussed from two aspects, one is unconditional security in quantum communication, and the other one is specific security against fingerprint system. We show the unconditional security of our proposed scheme first.
As we mentioned in Section
On the other side, owing to the speciality of quantum technique and the limitation of our laboratory, we cannot directly test the performance of the proposed scheme by using authentic fingerprint data, e.g., FVC2002 and FVC2004. Instead, we give the detailed specific security analysis in fingerprint system of our proposed scheme.
The specific security analysis in fingerprint system includes four aspects, which are briefly summarized as follows.
In what follows, we discuss the specific security analysis of our proposed scheme.
Our proposed scheme must guarantee the user’s privacy during the whole process of the quantum fingerprint system, therefore, several scenarios are considered to analyze the security against specific attacks aimed at the fingerprint system.
Assume that legal user’s quantum bit string is lost somehow. In this scenario, there is no need to be nervous only if the quantum bit string is stolen by eavesdropper. Actually, legal user’s quantum bit string is useless for the eavesdropper without knowing any other extra information. Since this string is formed by a set of EPR pairs according to a certain decision sequence and the interconversion rule, the eavesdropper cannot recover original biometric information from this quantum bit string because the formation rules are unknown. For the eavesdropper, he does not even know the state of each quantum bit in this string, he can only randomly choose a certain measurement basis to measure the quantum bit one-by-one. The probability of choosing the correct measurement basis for all quantum bits is
Consider two scenarios, which are lost decision sequence or lost measurement basis sequence, respectively. Each legal user corresponds to a unique PIN stored in the server database, every PIN is related to a decision sequence and a measurement basis sequence. If the decision sequence is stolen by an eavesdropper, all he knows is just the rules how to generate the EPR quantum bit string. On the other hand, if the measurement basis sequence is stolen, the eavesdropper can only be aware of which measurement basis can measure the quantum bit correctly. The eavesdropper actually does not know the user’s biometric information in both cases because these two sequences completely do not contain any minutiae information. That is to say, even though the eavesdropper knows the rules of how to generate the EPR quantum bit string or how to measure each quantum bit for a legal user, he still cannot recover a user’s original biometric information and thus cannot get successful access to the system.
The template is formed by the decision sequence and the measurement basis sequence through some bit-wise operators, as shown in Fig.
Lost encrypted key attack is the most dangerous situation in all attacks. This is because once the eavesdropper has acquired someone’s encrypted key, he can bypass all the former steps and directly use this encrypted key to start matching. Due to two identical encrypted keys as the matching step’s input, the score of
Our proposed scheme is applicable to different applications simultaneously. Due to the randomness of the generation of decision sequence and measurement basis sequence, templates generated by different applications are also different, even these templates are generated from the same fingerprint image. As a result, the final encrypted keys from the same fingerprint image are also different, which means an individual is allowed to enroll different templates by using the same finger for different applications without cross-matching. This feature provides the security on which even if the eavesdropper has obtained a template of the user in an application, he still cannot use this template to access other applications which the same user has enrolled using the same fingerprint.
An advantage of our quantum fingerprint system is remoteness. Users can carry a little device featured with client function or a mobile phone integrated client function to login the quantum fingerprint system remotely. For example, a user can unlock their house door remotely or absently authorize someone to do something with this system. The traditional fingerprint system may also do these things, but there is an important problem that cannot be ignored in the remote respect, that is, communication security. The traditional remote fingerprint system needs to transmit user’s minutiae information (translated or untranslated) to the server, which is a high risk process. In this step, an eavesdropper could intercept the information, even steal or revise it in order to get a fake access. Although some systems transmit information with classical cryptographic algorithm, the eavesdropper still has a chance to crack it.[29] Moreover, a stolen minutiae information can be copied by the eavesdropper, whenever the attacker wants to access the system, he can use the copy to login in.
In our proposed remote quantum fingerprint system, communication can be guaranteed by the unconditional security of quantum communication.[27] As can be seen in Figs.
There is one step in both enrollment stage and verification stage in which we need to transport quantum bits using quantum channel, that is, when a side has prepared EPR quantum bits, each particle in a single EPR quantum bit must be transported to the other side through the quantum channel. Granted that an eavesdropper has acquired the entire quantum bit string somehow, he still cannot copy this quantum bit string on account of no-cloning theorem. Furthermore, the eavesdropper will know nothing about the state of each particle in this quantum bit string, because once he measures these particles using an improper measurement basis, they will collapse into uncertain states and the original quantum state cannot be recovered.
In addition, note that user’s minutiae features actually do not transmit through either classical channel or quantum channel, which means an eavesdropper has no chance to acquire the user’s related fingerprint data during the communication process. The technique, which ensures fingerprint minutiae communication without passing any channel, is called quantum teleportation.[30–32]
Therefore, the security of remote communication of the quantum fingerprint system can be guaranteed by the inherent properties of quantum bit.
One may consider a kind of situation in which an eavesdropper has obtained a legal user’s encrypted key; he could modify a few bits to let
At the lost encrypted key attack, although the eavesdropper knows the encrypted key, he still can hardly derive the original biometric information (classical binary bit string as an input to this system), even if he knows the corresponding template. This feature is called irreversibility, which is guaranteed by uncertainty principle. This is because each bit in the encrypted key is formed by different measurement basis, the measurement result cannot be sure if the selected measurement basis is improper to the corresponding polarized photon state. Thus, the eavesdropper cannot recover the original classical binary bit string. If the eavesdropper mandatorily recovers the original classical binary bit string regardless of uncertainty principle, he will obtain a string of fragmentary and useless bits.
We proposed a cancelable remote quantum fingerprint templates protection scheme by exploiting the inherent properties of quantum state, specifically the uncertainty principle, no-cloning theorem, and entanglement. The proposed scheme has provided a novel orientation and idea for cancelable fingerprint verification system. By taking advantages of quantum techniques, the complexity of fingerprint identification system could be simplified tremendously and, foremost, the security and privacy of the system can be protected unconditionally. As the research goes on, there are several quantum communication techniques that can be considered to further improve the system. For example, a better scheme to defend the situation when
[1] | |
[2] | |
[3] | |
[4] | |
[5] | |
[6] | |
[7] | |
[8] | |
[9] | |
[10] | |
[11] | |
[12] | |
[13] | |
[14] | |
[15] | |
[16] | |
[17] | |
[18] | |
[19] | |
[20] | |
[21] | |
[22] | |
[23] | |
[24] | |
[25] | |
[26] | |
[27] | |
[28] | |
[29] | |
[30] | |
[31] | |
[32] | |
[33] | |
[34] |