Abstract
Newer protocols for authentication using Aadhaar have been introduced to enhance privacy and security. In this article, we analyze the security and privacy of these new models. We consider the original Aadhaar model [4], the newer VID Aadhaar model [1] introduced by UIDAI, our own CP-UID model [11] and compare them with respect to privacy and scalability. We also introduce and discuss a newer hybrid model based on the VID model that has enhanced privacy. We also present an analysis of the biometric locking feature of Aadhaar.
Keywords
- National identities
- Privacy
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
(2018). https://www.uidai.gov.in/images/resource/UIDAI_Circular_11012018.pdf
(2018). https://www.uidai.gov.in/aadhaar_dashboard/india.php
(2018). https://uidai.gov.in/images/resource/aadhaar_authentication_api_2_5.pdf
Agrawal, S., Banerjee, S., Sharma, S.: Privacy and security of Aadhaar: a computer science perspective. Econ. Polit. Weekly 52(37), 93–102 (2017)
Banerjee, S., Sharma, S.: An offline alternative for Aadhaar-based biometric authentication (2018). http://www.ideasforindia.in/topics/productivity-innovation/an-offline-alternative-for-aadhaar-based-biometric-authentication.html
Gupta, K.: Uidai wades in amid twitter row over R.S. Sharma’s Aadhaar dare (2018). https://www.livemint.com/Politics/jwcBx4IHN6H5l90O14iRHM/UIDAI-wades-in-amid-Twitter-row-over-RS-Sharmas-Aadhaar-d.html
Hern, A.: Hacker fakes German minister’s fingerprints using photos of her hands (2018). https://www.theguardian.com/technology/2014/dec/30/hacker-fakes-german-ministers-fingerprints-using-photos-of-her-hands
Times of India: LPG subsidy of rs 168 crore sent to Airtel payments bank accounts (2018). https://timesofindia.indiatimes.com/business/india-business/lpg-subsidy-of-rs-168-crore-sent-to-airtel-payments-bank-accounts/articleshow/62120108.cms
Lamport, L.: Constructing digital signatures from a one-way function. Technical report, Technical Report CSL-98, SRI International Palo Alto (1979)
Maheswaran, J., Wolinsky, D.I., Ford, B.: Crypto-book: an architecture for privacy preserving online identities. In: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, p. 14. ACM (2013)
Rajput, A., Gopinath, K.: Towards a more secure Aadhaar. In: Shyamasundar, R.K., Singh, V., Vaidya, J. (eds.) ICISS 2017. LNCS, vol. 10717, pp. 283–300. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72598-7_17
Blanchet, B., Cheval, V., Allamigeon, X., Smyth, B.: ProVerif: cryptographic protocol verifier in the formal model (2010). http://prosecco.gforge.inria.fr/personal/bblanche/proverif
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Rajput, A., Gopinath, K. (2018). Analysis of Newer Aadhaar Privacy Models. In: Ganapathy, V., Jaeger, T., Shyamasundar, R. (eds) Information Systems Security. ICISS 2018. Lecture Notes in Computer Science(), vol 11281. Springer, Cham. https://doi.org/10.1007/978-3-030-05171-6_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-05171-6_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05170-9
Online ISBN: 978-3-030-05171-6
eBook Packages: Computer ScienceComputer Science (R0)