Practical Digital Signature Generation Using Biometrics

  • Taekyoung Kwon
  • Jae-il Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3043)

Abstract

It is desirable to generate a digital signature using biometrics but not practicable because of its inaccurate measuring and potential hill-climbing attacks, without using specific hardware devices that hold signature keys or biometric templates securely. We study a simple practical method for biometrics based digital signature generation without such restriction, by exploiting the existing tools in software in our proposed model where a general digital signature such as RSA can be applied without losing its security.

Keywords

Authentication digital signature biometrics public key infrastructure 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bellare, M., Sandhu, R.: The security of practical two-party RSA signature schemes (2001) (manuscript) Google Scholar
  2. 2.
    Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society (AMS) 46(2), 203–213 (1999)MATHMathSciNetGoogle Scholar
  3. 3.
    Boneh, D., Durfee, G.: Cryptanalysis of RSA with private key d less than N0.292. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 1–11. Springer, Heidelberg (1999) and IEEE Trans. on Information Theory 46(4) (2000)Google Scholar
  4. 4.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Boyd, C.: Digital multisignatures, Cryptography and Coding, pp. 241–246. Oxford University Press, Oxford (1989)Google Scholar
  6. 6.
    Brands, S.: Rethinking public key infrastructures and digital certificates, p.11 and pp. 219–224. The MIT Press, Cambridge (2000)Google Scholar
  7. 7.
    Burke, H.E.: Handbook of bar Coding Systems. Van Nostrand Reinhold, New York (1984)Google Scholar
  8. 8.
    Daon Inc., Biometric Authentication & Digital Signatures for the Pharmaceutical Industry, White paper available at http://www.daon.com/downloads/publications/esignature.pdf
  9. 9.
    Daugman, J.: High confidence personal identifications by rapid video analysis of iris texture. In: IEEE International Carnahan Conference on Security Technologies, pp. 50–60 (1992)Google Scholar
  10. 10.
    Daugman, J.: High confidence personal identifications by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15(11), 648–656 (1993)CrossRefGoogle Scholar
  11. 11.
    Davida, G., Frankel, Y., Matt, B.: On enabling secure applications through offline biometric identification. In: IEEE Symposium on Security and Privacy, pp. 148–159 (1998)Google Scholar
  12. 12.
    Denso Inc., QRmaker: User’s Manual, Denso Corporation, Aichi, Japan (1998) Google Scholar
  13. 13.
    Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing 17(2), 281–308 (1988)MATHCrossRefMathSciNetGoogle Scholar
  14. 14.
    Jain, A., Hong, L., Pankanti, S.: Biometric identification. Communications of the ACM (February 2000)Google Scholar
  15. 15.
    Janbandhu, P., Siyal, M.: Novel biometric digital signatures for Internet-based applications. Information Management & Computer Security 9(5), 205–212 (2001)CrossRefGoogle Scholar
  16. 16.
    Matyáš, V., Říha, Z.: Biometric authentication - security and usability, Manuscrypt available at http://www.fi.muni.cz/usr/matyas/cms_matyas_riha_biometrics.pdf
  17. 17.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, pp. 287–291 and 312–315. CRC Press, Boca Raton (1997)Google Scholar
  18. 18.
    Nagpal, R., Nagpal, S.: Biometric based digital signature scheme, Internet- Draft, draft-nagpal-biometric-digital-signature-00.txt (May 2002) Google Scholar
  19. 19.
    Palmer, R.C.: The Bar Code Book, 3rd edn. Helmers Publishing, Peterborough (1995)Google Scholar
  20. 20.
    Orvos, P.: Towards biometric digital signatures. In: Networkshop, Eszterhazy College, Eger, March 2002, pp. 26–28 (2002)Google Scholar
  21. 21.
    Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)MATHCrossRefMathSciNetGoogle Scholar
  22. 22.
    Soutar, C.: Biometric system performance and security, Manuscrypt available at http://www.bioscrypt.com/assets/bio_paper.pdf (2002)
  23. 23.
    Soutar, C., Roberge, D., Stoianov, A., Golroy, R., Vijaya Kumar, B.: Biometric Encryption, ICSA Guide to Cryptography, McGraw-Hill (1999), also available at http://www.bioscrypt.com/assets/Biometric_Encryption.pdf
  24. 24.
    Wiener, M.: Cryptanalysis of short RSA secret exponents. IEEE Transactions on Information Theory 36(3) (May 1990)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Taekyoung Kwon
    • 1
  • Jae-il Lee
    • 2
  1. 1.Sejong UniversitySeoulKorea
  2. 2.Korea Information Security AgencySeoulKorea

Personalised recommendations