Advertisement

Biometric Digital Key Mechanisms for Telebiometric Authentication Based on Biometric Certificate

  • Hyung-Woo Lee
  • Taekyoung Kwon
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4554)

Abstract

Existing biometric authentication systems use probabilistic method to decide the claimed identity of a user. But, these are weak on the privacy protection perspective as anyone can access someone’s biometric template without restrictions. Therefore, we propose a scheme that can improve the biometric authentication accuracy with the concept of digital signature with biometric digital key. By using these biometric digital key pairs, each entity(sender) can mutually authenticate the others based on the biometric certificate on open network.

Keywords

Digital Signature Certificate Authority Biometric Data Biometric Authentication Seed Data 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)zbMATHCrossRefGoogle Scholar
  2. 2.
    Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society (AMS) 46(2), 203–213 (1999)zbMATHGoogle Scholar
  3. 3.
    ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Transactions on Information Theory 30(4), 469–472 (1985)CrossRefGoogle Scholar
  4. 4.
    Juels, A., Sudan, M.: A Fuzzy Vault Scheme, also available at http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/fuzzy-vault/fuzzy_vault.pdf
  5. 5.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, pp. 312–315. CRC Press, Boca Raton (1997)zbMATHGoogle Scholar
  6. 6.
    Hong, L., Wan, Y., Jain, A.K.: Fingerprint image enhancement: Algorithm and performance evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence 8, 777–789 (1998)CrossRefGoogle Scholar
  7. 7.
    Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)Google Scholar
  8. 8.
    Daon Inc. Biometric Authentication & Digital Signatures for the Pharmaceutical Industry, White paper, available at http://www.daon.com/downloads/publications/esignature.pdf
  9. 9.
    Daugman, J.: High confidence personal identifications by rapid video analysis of iris texture. In: IEEE Intern. Carnahan Conference on Security Technologies, pp. 50–60 (1992)Google Scholar
  10. 10.
    Daugman, J.: High confidence personal identifications by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15(11), 648–656 (1993)CrossRefGoogle Scholar
  11. 11.
    Davida, G., Frankel, Y., Matt, B.: On enabling secure applications through off-line biometric identification. In: IEEE Symposium on Security and Privacy, pp.148–159 (1998)Google Scholar
  12. 12.
    Soutar, C., Roberge, D., Stoianov, A., Golroy, R., Kumar, B.V.: Biometric Encryption, In: ICSA Guide to Cryptography (1999), also available at http://www.bioscrypt.com/assets/
  13. 13.
    Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to generate strong keys from biometric identification. In: Proceedings of the IEEE Security and Privacy (1998)Google Scholar
  14. 14.
    Orvos, P.: Towards biometric digital signatures. In: Networkshop, Eszterhazy College, Eger, pp. 26–28, (March 2002)Google Scholar
  15. 15.
    Nagpal, R., Nagpal, S.: Biometric based digital signature scheme. In: Internet-Draft, draft-nagpal-biometric-digital-signature-00.txt (May 2002)Google Scholar
  16. 16.
    Jain, A., Hong, L., Pankanti, S.: Biometric identification. Communications of the ACM (February 2000)Google Scholar
  17. 17.
    Janbandhu, P., Siyal, M.: Novel biometric digital signatures for Internet-based applications. Information Management & Computer Security 9(5), 205–212 (2001)CrossRefGoogle Scholar
  18. 18.
    Kwon, T., Lee, J.: Practical digital signature generation using biometrics. In: Laganà, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, Springer, Heidelberg (2004)Google Scholar
  19. 19.
    Matyas, V., Rıha, Z.: Biometric authentication security and usability. Manuscrypt, available at http://www.fi.muni.cz/usr/matyas/cms_matyas_riha_biometrics.pdf
  20. 20.
    Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometrics. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147–163. Springer, Heidelberg (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Hyung-Woo Lee
    • 1
  • Taekyoung Kwon
    • 2
  1. 1.Div. of Computer, Information & Software, Hanshin University, 411, Yangsan-dong, Osan, Kyyunggi, 447-791Korea
  2. 2.Dept. of Computer Engineering, Sejong University, Seoul, 143-747Korea

Personalised recommendations