A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification
Computer networks have evolved from close local networks to open interconnected networks and the operations from data communication to online transaction. As such, identity authentication is indispensable in today’s computing platform. Current identity authentication techniques primarily focus on Public Key Infrastructure (PKI) or Identity Based Encryption (IBE). However, these techniques authenticate users’ identity relying on tokens or keys and one or many trustworthy third-party(s) that require databases running online, with multiple points of vulnerability and low efficiency.
KeywordsHomeland Security Fingerprint Image Feature Code Public Parameter Identity Authentication
- 5.Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. In: Proceedings of the IEEE, Special. Issue on Enabling Security Technologies for Digital Rights Management, June 2004, vol. 92(6) (2004)Google Scholar