Skip to main content

Biometric Creation of Digital Signatures and Their Application in Blockchain

  • Conference paper
  • First Online:
Sustainable Business Management and Digital Transformation: Challenges and Opportunities in the Post-COVID Era (SymOrg 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 562))

Included in the following conference series:

Abstract

Blockchain transactions are secured from falsification by appending a digital signature using the PKI (Public key infrastructure). When signing a blockchain transaction, the user must have access to his private key, which must be kept on a hardware or software token. The scientific works analyzed in this paper represent the application of Blockchain technology in payment card system, and in this way the architecture of the system is simplified. The fusion of biometric technology and blockchain technology, which allows a blockchain transaction to be signed without tokens and eliminates the need for a third-party transaction validator, has improved the functionality of current payment card systems. This paper contains three contributions. It is first demonstrated how different biometrically based digital signature models reported in the literature compare, then it is demonstrated how blockchain transactions can be digitally signed using digital signatures made using biometrics, and finally, because biometric digital signature creation methods have not attracted much attention in the scientific public, a detailed comparison of the FIBS (Fuzzy Identity Based Signature) scheme and the Fuzzy signature method was presented as for these two schemes was shown that we can implement them in Blockchain and Payment Card System.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Badovinac, N., Simic, D.: E-payment systems using multi-card smart card. In: Book of Springer Proceedings in series: Springer Proceedings in Business and Economics – XIII Balkan Conference on Operational Research, ISBN 978-3-030-21989-5, 1st edition, pp. 237–249 (2019)

    Google Scholar 

  2. Godfrey-Welch, D., Lagrois, R., Law, J., Anderwald, R., Engels, D.: Blockchain in payment card systems. SMU Data Science Review 1(1), Article 3 (2018)

    Google Scholar 

  3. Badovinac, N., Simic. D.: A multimodal biometric authentication (MBA) in card payment systems. In: 2019 International Conference on Artificial Intelligence: Applications and Innovations (IC-AIAI), pp. 23–26. Belgrade, Serbia (2019)

    Google Scholar 

  4. Bogicevic, S., M., Milenkovic, I., Jovanovic, B., Simic, D., Minovic, M., Milovanovic, M.: Bringing biometric sensors to the classroom: a fingerprint acquisition laboratory for improving student motivation and commitment. Appl. Sci. 10, 880 (2020). https://doi.org/10.3390/app10030880

  5. Korac, D., Simic, D.: Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment. Comput. Secur. 85, 313–332 (2019). https://doi.org/10.1016/j.cose.2019.05.011

    Article  Google Scholar 

  6. Zutshi, A., Grilo, A., Tahereh, N.: The value proposition of blockchain technologies and its impact on Digital Platforms. Department of Mechanical and Industrial Engineering at NOVA School of Science and Technology. Universidade Nova de Lisboa, Portugal (2021). https://doi.org/10.1016/j.cie.2021.107187

  7. Kaga, Y., et al.: A Secure and Practical Signature Scheme for Blockchain Based on Biometrics. In: Liu, J.K., Samarati, P. (eds.) ISPEC 2017. LNCS, vol. 10701, pp. 877–891. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72359-4_55

    Chapter  Google Scholar 

  8. Milenković, I., Šošević, U., Simić, D., Minović, M., Milovanović, M.: Improving student engagement in a biometric classroom: the contribution of gamification. Univ. Access Inf. Soc. 18(3), 523–532 (2019). https://doi.org/10.1007/s10209-019-00676-9

    Article  Google Scholar 

  9. Umut, U., Sharath, P., Salil, P., Anil, K.J.: Biometric cryptosystems: issues and challenges. In: Proceedings of the IEEE 92(6), 0018–9219/04 (2004)

    Google Scholar 

  10. Yao-Jen, C., Wende, Z., Tsuhan C.: Biometric-based cryptographic key generation. In: 2004 IEEE International Conference on Multimedia and Expo (ICME), 0-7803-8603-5/04/520.002004 IEEE (2004)

    Google Scholar 

  11. Oday, A., Abdulhussein, H.A., Darwish, S.M., Othman, Z.A., Tiun, S., Lotfy, A.Y.: Towards a secure signature scheme based on multimodal biometric technology: application for IOT blockchain network. Symmetry 1699 (2020). https://doi.org/10.3390/sym12101699

  12. Takahashi, K., Matsuda, T., Murakami, T., Hanaoka, G., Nishigaki, M.: Signature schemes with a fuzzy private key. Int. J. Inf. Secur. 18(5), 581–617 (2019). https://doi.org/10.1007/s10207-019-00428-z

    Article  MATH  Google Scholar 

  13. Sashank, R., Venkatachalam, S., Kannan, P., Palanisamy, V.: Cryptography key generation using biometrics. In: 2009 International Conference on Control, Communication and Energy Conservation, pp. 1–6 (2009)

    Google Scholar 

  14. Lifang, W., Xingsheng, L., Songlong, Y., Peng, X.: A novel key generation cryptosystem based on face features. In: IEEE 10th International Conference On Signal Processing Proceedings, pp. 1675–1678. Beijing, China (2010). https://doi.org/10.1109/ICOSP.2010.5656719

  15. Nguyen, H.L., Nguyen, T.T.: An approach to protect private key using fingerprint biometric encryption key in BioPKI based security system. In: 10th International Conference on Control, Automation, Robotics and Vision, pp. 1595–1599. Hanoi, Vietnam (2008). https://doi.org/10.1109/ICARCV.-2008.4795763

  16. Nalini, K., Sharat, C., Jonathan, H., C., Ruud, M.: Generating cancelable fingerprint templates. IEEE Transactions On Pattern Analysis And Machine Intelligence, In: IEEE Published by the IEEE Computer Societ, vol. 29(4) (2007)

    Google Scholar 

  17. Rathgeb, C., Uhl, A.: Context-based biometric key generation for Iris. In: Published in IET Computer Vision Received, 8th October (2010). https://doi.org/10.1049/iet-cvi.2010.0176

  18. Feng, H., Ross, A., Daugman, J.: Combining crypto with biometrics effectively. IEEE Transactions On Computers 55(9) (2006)

    Google Scholar 

  19. Yazhuo, G., Kaifa, D., Pengfei, S.: PKI key generation based on iris features. In: 2008 International Conference on Computer Science and Software Engineering 978-0-7695-3336-0/08. IEEE (2008). https://doi.org/10.1109/CSSE.2008.1181

  20. Jo, J.-G., Seo, J.-W., Lee, H.-W.: Biometric Digital Signature Key Generation and Cryptography Communication Based on Fingerprint. In: Preparata, F.P., Fang, Q. (eds.) FAW 2007. LNCS, vol. 4613, pp. 38–49. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73814-5_4

    Chapter  Google Scholar 

  21. Syh-Yuan, T., Zhe, J., Andrew, B., Teoh, J., Bok-Min, G., Swee-Huay, H.: On the realization of fuzzy identity-based identification scheme using fingerprint biometrics. Security And Communitaction Networks, In: Published online in Wiley Online Library (2012). https://doi.org/10.1002/sec.408

  22. Wang, Y., Plataniotis, K.N.: Fuzzy vault for face based cryptographic key generation. In: 2007 Biometrics Symposium, pp. 1–6 (2007). https://doi.org/10.1109/BCC.2007.4430549

  23. Tan, S.Y., Heng, S.H., Goi, B.M.: On the security of two fuzzy identity-based signature schemes. In: 4th IFIP International Conference on New Technologies, Mobility and Security, pp. 1–5 (2011). https://doi.org/10.1109/NTMS.2011.5721040

  24. Xiaojun, Z., Chunxiang, X., Yuan, Z.: Fuzzy identity-based signature scheme from lattice and its application in biometric authentication. In: KSII Transactions On Internet And Informations System 11(5), p. 2762 (2017). https://doi.org/10.3837/tiis.2017.05.025

  25. Yanhua, Z., Yupu, H., Yong, G., Yifeng, Y., Huiwen, J.: Efficient fuzzy identity-based signature from lattices for identities in a small (or large) universe. J. Info. Secu. Appl. 47 (2019). https://doi.org/10.1016/j.jisa.2019.04.012

  26. Shan, X., You, L., Hu, G.: Two efficient constructions for biometric-based signature in identity-based setting using bilinear pairings. IEEE Access 9, 25973–25983 (2021). https://doi.org/10.1109/ACCESS.2021.3057064

  27. Matsuda, T., Takahashi, K., Murakami, T., Hanaoka, G.: Fuzzy Signatures: Relaxing Requirements and a New Construction. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 97–116. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39555-5_6

    Chapter  MATH  Google Scholar 

  28. Godfrey-Welch, D., Remy L., Jared L.: Blockchain in Payment Card Systems, p. 75205. Southern Methodist University, Dallas, Texas (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nenad Badovinac .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Badovinac, N., Simić, D. (2023). Biometric Creation of Digital Signatures and Their Application in Blockchain. In: Mihić, M., Jednak, S., Savić, G. (eds) Sustainable Business Management and Digital Transformation: Challenges and Opportunities in the Post-COVID Era. SymOrg 2022. Lecture Notes in Networks and Systems, vol 562. Springer, Cham. https://doi.org/10.1007/978-3-031-18645-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-18645-5_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-18644-8

  • Online ISBN: 978-3-031-18645-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics