Skip to main content

A Simple Auditable Fingerprint Authentication Scheme Using Smart-Contracts

  • Conference paper
  • First Online:
Smart Blockchain (SmartBlock 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11373))

Included in the following conference series:

Abstract

Biometric authentication, and notably using fingerprints, are now common. Despite its usability, biometrics have however a caveat which is the impossibility of revocation: once the raw fingerprint is breached, and depending on the technology of the reader, it is impossible to stop an illegitimate authentication. This places a focus on auditing both to detect fraud and to have clear indications that the fingerprint has been breached. In this paper we show how to take advantage of the immutability property of Blockchains to design an auditable protocol based on Diffie-Hellman key exchange with applications to fingerprint authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jain, A.K., Nandakumar, K.: Biometric authentication: system security and user privacy. IEEE Comput. 45, 87–92 (2012)

    Article  Google Scholar 

  2. Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)

    Article  Google Scholar 

  3. Abreu, P., Aparicio, M., Costa, C.: Blockchain technology in the auditing environment. Caceres, CISTI (2018)

    Google Scholar 

  4. Pakutharivu, P., Srinath, M.V.: A Comprehensive survey on fingerprint recognition systems. Indian J. Sci. Technol. 8(35), 1–7 (2015)

    Article  Google Scholar 

  5. Meng, W., Wong, D.S., Furnell, S., Zhou, J.: Surveying the development of biometric user authentication on mobile phones. IEEE Commun. Surv. Tutor. 17(3), 1268–1293 (2015)

    Article  Google Scholar 

  6. Hammudoglu, J.S., et al.: Portable trust: biometric-based authentication and blockchain storage for self-sovereign identity systems, June 2017. http://cn.arxiv.org/pdf/1706.03744

  7. Nandakumar, K., Ratha, N., Pankanti, S., Darnell, S.: Secure one-time biometric tokens for non-repudiable multi-party transactions. In: IEEE Workshop on Information Forensics and Security (WIFS), December 2017, Rennes, France (2017)

    Google Scholar 

  8. Vazan, R.: SourceAFIS. https://sourceafis.machinezoo.com. Accessed 26 Sept 2018

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vitor Jesus .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhou, X., Hafedh, Y., Wang, Y., Jesus, V. (2018). A Simple Auditable Fingerprint Authentication Scheme Using Smart-Contracts. In: Qiu, M. (eds) Smart Blockchain. SmartBlock 2018. Lecture Notes in Computer Science(), vol 11373. Springer, Cham. https://doi.org/10.1007/978-3-030-05764-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05764-0_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05763-3

  • Online ISBN: 978-3-030-05764-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics