ICCSA 2004: Computational Science and Its Applications – ICCSA 2004 pp 728-737 | Cite as
Practical Digital Signature Generation Using Biometrics
Conference paper
Abstract
It is desirable to generate a digital signature using biometrics but not practicable because of its inaccurate measuring and potential hill-climbing attacks, without using specific hardware devices that hold signature keys or biometric templates securely. We study a simple practical method for biometrics based digital signature generation without such restriction, by exploiting the existing tools in software in our proposed model where a general digital signature such as RSA can be applied without losing its security.
Keywords
Authentication digital signature biometrics public key infrastructurePreview
Unable to display preview. Download preview PDF.
References
- 1.Bellare, M., Sandhu, R.: The security of practical two-party RSA signature schemes (2001) (manuscript) Google Scholar
- 2.Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society (AMS) 46(2), 203–213 (1999)MATHMathSciNetGoogle Scholar
- 3.Boneh, D., Durfee, G.: Cryptanalysis of RSA with private key d less than N0.292. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 1–11. Springer, Heidelberg (1999) and IEEE Trans. on Information Theory 46(4) (2000)Google Scholar
- 4.Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)CrossRefGoogle Scholar
- 5.Boyd, C.: Digital multisignatures, Cryptography and Coding, pp. 241–246. Oxford University Press, Oxford (1989)Google Scholar
- 6.Brands, S.: Rethinking public key infrastructures and digital certificates, p.11 and pp. 219–224. The MIT Press, Cambridge (2000)Google Scholar
- 7.Burke, H.E.: Handbook of bar Coding Systems. Van Nostrand Reinhold, New York (1984)Google Scholar
- 8.Daon Inc., Biometric Authentication & Digital Signatures for the Pharmaceutical Industry, White paper available at http://www.daon.com/downloads/publications/esignature.pdf
- 9.Daugman, J.: High confidence personal identifications by rapid video analysis of iris texture. In: IEEE International Carnahan Conference on Security Technologies, pp. 50–60 (1992)Google Scholar
- 10.Daugman, J.: High confidence personal identifications by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15(11), 648–656 (1993)CrossRefGoogle Scholar
- 11.Davida, G., Frankel, Y., Matt, B.: On enabling secure applications through offline biometric identification. In: IEEE Symposium on Security and Privacy, pp. 148–159 (1998)Google Scholar
- 12.Denso Inc., QRmaker: User’s Manual, Denso Corporation, Aichi, Japan (1998) Google Scholar
- 13.Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing 17(2), 281–308 (1988)MATHCrossRefMathSciNetGoogle Scholar
- 14.Jain, A., Hong, L., Pankanti, S.: Biometric identification. Communications of the ACM (February 2000)Google Scholar
- 15.Janbandhu, P., Siyal, M.: Novel biometric digital signatures for Internet-based applications. Information Management & Computer Security 9(5), 205–212 (2001)CrossRefGoogle Scholar
- 16.Matyáš, V., Říha, Z.: Biometric authentication - security and usability, Manuscrypt available at http://www.fi.muni.cz/usr/matyas/cms_matyas_riha_biometrics.pdf
- 17.Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, pp. 287–291 and 312–315. CRC Press, Boca Raton (1997)Google Scholar
- 18.Nagpal, R., Nagpal, S.: Biometric based digital signature scheme, Internet- Draft, draft-nagpal-biometric-digital-signature-00.txt (May 2002) Google Scholar
- 19.Palmer, R.C.: The Bar Code Book, 3rd edn. Helmers Publishing, Peterborough (1995)Google Scholar
- 20.Orvos, P.: Towards biometric digital signatures. In: Networkshop, Eszterhazy College, Eger, March 2002, pp. 26–28 (2002)Google Scholar
- 21.Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)MATHCrossRefMathSciNetGoogle Scholar
- 22.Soutar, C.: Biometric system performance and security, Manuscrypt available at http://www.bioscrypt.com/assets/bio_paper.pdf (2002)
- 23.Soutar, C., Roberge, D., Stoianov, A., Golroy, R., Vijaya Kumar, B.: Biometric Encryption, ICSA Guide to Cryptography, McGraw-Hill (1999), also available at http://www.bioscrypt.com/assets/Biometric_Encryption.pdf
- 24.Wiener, M.: Cryptanalysis of short RSA secret exponents. IEEE Transactions on Information Theory 36(3) (May 1990)Google Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2004