TY - GEN
T1 - Modeling cryptographic properties of voice and voice-based entity authentication
AU - Di Crescenzo, Giovanni
AU - Cochinwala, Munir
AU - Shim, Hyong S.
PY - 2007
Y1 - 2007
N2 - Strong and/or multi-factor entity authentication protocols are of crucial importance in building successful identity management architectures. Popular mechanisms to achieve these types of entity authentication are biometrics, and, in particular, voice, for which there are especially interesting business cases in the telecommunication and financial industries, among others. Despite several studies on the suitability of voice within entity authentication protocols, there has been little or no formal analysis of any such methods. In this paper we embark into formal modeling of seemingly cryptographic properties of voice. The goal is to define a formal abstraction for voice, in terms of algorithms with certain properties, that are of both combinatorial and cryptographic type. While we certainly do not expect to achieve the perfect mathematical model for a human phenomenon, we do hope that capturing some properties of voice in a formal model would help towards the design and analysis of voicebased cryptographic protocols, as for entity authentication. In particular, in this model we design and formally analyze two voice-based entity authentication schemes, the first being a voice-based analogue of the conventional passwordtransmission entity authentication scheme. We also design and analyze, in the recently introduced bounded-retrieval model [4], one voice-and-password- based entity authentication scheme that is additionally secure against intrusions and brute-force attacks, including dictionary attacks.
AB - Strong and/or multi-factor entity authentication protocols are of crucial importance in building successful identity management architectures. Popular mechanisms to achieve these types of entity authentication are biometrics, and, in particular, voice, for which there are especially interesting business cases in the telecommunication and financial industries, among others. Despite several studies on the suitability of voice within entity authentication protocols, there has been little or no formal analysis of any such methods. In this paper we embark into formal modeling of seemingly cryptographic properties of voice. The goal is to define a formal abstraction for voice, in terms of algorithms with certain properties, that are of both combinatorial and cryptographic type. While we certainly do not expect to achieve the perfect mathematical model for a human phenomenon, we do hope that capturing some properties of voice in a formal model would help towards the design and analysis of voicebased cryptographic protocols, as for entity authentication. In particular, in this model we design and formally analyze two voice-based entity authentication schemes, the first being a voice-based analogue of the conventional passwordtransmission entity authentication scheme. We also design and analyze, in the recently introduced bounded-retrieval model [4], one voice-and-password- based entity authentication scheme that is additionally secure against intrusions and brute-force attacks, including dictionary attacks.
KW - Biometrics
KW - Entity authentication
KW - Modeling human factors
KW - Voice
UR - http://www.scopus.com/inward/record.url?scp=70349322665&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70349322665&partnerID=8YFLogxK
U2 - 10.1145/1314403.1314413
DO - 10.1145/1314403.1314413
M3 - Conference contribution
AN - SCOPUS:70349322665
SN - 9781595938893
T3 - DIM'07 - Proceedings of the 2007 ACM Workshop on Digital Identity Management
SP - 53
EP - 61
BT - DIM'07 - Proceedings of the 2007 ACM Workshop on Digital Identity Management
T2 - 2007 ACM Workshop on Digital Identity Management, DIM'07
Y2 - 2 November 2007 through 2 November 2007
ER -