Abstract
Blockchain transactions are secured from falsification by appending a digital signature using the PKI (Public key infrastructure). When signing a blockchain transaction, the user must have access to his private key, which must be kept on a hardware or software token. The scientific works analyzed in this paper represent the application of Blockchain technology in payment card system, and in this way the architecture of the system is simplified. The fusion of biometric technology and blockchain technology, which allows a blockchain transaction to be signed without tokens and eliminates the need for a third-party transaction validator, has improved the functionality of current payment card systems. This paper contains three contributions. It is first demonstrated how different biometrically based digital signature models reported in the literature compare, then it is demonstrated how blockchain transactions can be digitally signed using digital signatures made using biometrics, and finally, because biometric digital signature creation methods have not attracted much attention in the scientific public, a detailed comparison of the FIBS (Fuzzy Identity Based Signature) scheme and the Fuzzy signature method was presented as for these two schemes was shown that we can implement them in Blockchain and Payment Card System.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Badovinac, N., Simic, D.: E-payment systems using multi-card smart card. In: Book of Springer Proceedings in series: Springer Proceedings in Business and Economics – XIII Balkan Conference on Operational Research, ISBN 978-3-030-21989-5, 1st edition, pp. 237–249 (2019)
Godfrey-Welch, D., Lagrois, R., Law, J., Anderwald, R., Engels, D.: Blockchain in payment card systems. SMU Data Science Review 1(1), Article 3 (2018)
Badovinac, N., Simic. D.: A multimodal biometric authentication (MBA) in card payment systems. In: 2019 International Conference on Artificial Intelligence: Applications and Innovations (IC-AIAI), pp. 23–26. Belgrade, Serbia (2019)
Bogicevic, S., M., Milenkovic, I., Jovanovic, B., Simic, D., Minovic, M., Milovanovic, M.: Bringing biometric sensors to the classroom: a fingerprint acquisition laboratory for improving student motivation and commitment. Appl. Sci. 10, 880 (2020). https://doi.org/10.3390/app10030880
Korac, D., Simic, D.: Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment. Comput. Secur. 85, 313–332 (2019). https://doi.org/10.1016/j.cose.2019.05.011
Zutshi, A., Grilo, A., Tahereh, N.: The value proposition of blockchain technologies and its impact on Digital Platforms. Department of Mechanical and Industrial Engineering at NOVA School of Science and Technology. Universidade Nova de Lisboa, Portugal (2021). https://doi.org/10.1016/j.cie.2021.107187
Kaga, Y., et al.: A Secure and Practical Signature Scheme for Blockchain Based on Biometrics. In: Liu, J.K., Samarati, P. (eds.) ISPEC 2017. LNCS, vol. 10701, pp. 877–891. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72359-4_55
Milenković, I., Šošević, U., Simić, D., Minović, M., Milovanović, M.: Improving student engagement in a biometric classroom: the contribution of gamification. Univ. Access Inf. Soc. 18(3), 523–532 (2019). https://doi.org/10.1007/s10209-019-00676-9
Umut, U., Sharath, P., Salil, P., Anil, K.J.: Biometric cryptosystems: issues and challenges. In: Proceedings of the IEEE 92(6), 0018–9219/04 (2004)
Yao-Jen, C., Wende, Z., Tsuhan C.: Biometric-based cryptographic key generation. In: 2004 IEEE International Conference on Multimedia and Expo (ICME), 0-7803-8603-5/04/520.002004 IEEE (2004)
Oday, A., Abdulhussein, H.A., Darwish, S.M., Othman, Z.A., Tiun, S., Lotfy, A.Y.: Towards a secure signature scheme based on multimodal biometric technology: application for IOT blockchain network. Symmetry 1699 (2020). https://doi.org/10.3390/sym12101699
Takahashi, K., Matsuda, T., Murakami, T., Hanaoka, G., Nishigaki, M.: Signature schemes with a fuzzy private key. Int. J. Inf. Secur. 18(5), 581–617 (2019). https://doi.org/10.1007/s10207-019-00428-z
Sashank, R., Venkatachalam, S., Kannan, P., Palanisamy, V.: Cryptography key generation using biometrics. In: 2009 International Conference on Control, Communication and Energy Conservation, pp. 1–6 (2009)
Lifang, W., Xingsheng, L., Songlong, Y., Peng, X.: A novel key generation cryptosystem based on face features. In: IEEE 10th International Conference On Signal Processing Proceedings, pp. 1675–1678. Beijing, China (2010). https://doi.org/10.1109/ICOSP.2010.5656719
Nguyen, H.L., Nguyen, T.T.: An approach to protect private key using fingerprint biometric encryption key in BioPKI based security system. In: 10th International Conference on Control, Automation, Robotics and Vision, pp. 1595–1599. Hanoi, Vietnam (2008). https://doi.org/10.1109/ICARCV.-2008.4795763
Nalini, K., Sharat, C., Jonathan, H., C., Ruud, M.: Generating cancelable fingerprint templates. IEEE Transactions On Pattern Analysis And Machine Intelligence, In: IEEE Published by the IEEE Computer Societ, vol. 29(4) (2007)
Rathgeb, C., Uhl, A.: Context-based biometric key generation for Iris. In: Published in IET Computer Vision Received, 8th October (2010). https://doi.org/10.1049/iet-cvi.2010.0176
Feng, H., Ross, A., Daugman, J.: Combining crypto with biometrics effectively. IEEE Transactions On Computers 55(9) (2006)
Yazhuo, G., Kaifa, D., Pengfei, S.: PKI key generation based on iris features. In: 2008 International Conference on Computer Science and Software Engineering 978-0-7695-3336-0/08. IEEE (2008). https://doi.org/10.1109/CSSE.2008.1181
Jo, J.-G., Seo, J.-W., Lee, H.-W.: Biometric Digital Signature Key Generation and Cryptography Communication Based on Fingerprint. In: Preparata, F.P., Fang, Q. (eds.) FAW 2007. LNCS, vol. 4613, pp. 38–49. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73814-5_4
Syh-Yuan, T., Zhe, J., Andrew, B., Teoh, J., Bok-Min, G., Swee-Huay, H.: On the realization of fuzzy identity-based identification scheme using fingerprint biometrics. Security And Communitaction Networks, In: Published online in Wiley Online Library (2012). https://doi.org/10.1002/sec.408
Wang, Y., Plataniotis, K.N.: Fuzzy vault for face based cryptographic key generation. In: 2007 Biometrics Symposium, pp. 1–6 (2007). https://doi.org/10.1109/BCC.2007.4430549
Tan, S.Y., Heng, S.H., Goi, B.M.: On the security of two fuzzy identity-based signature schemes. In: 4th IFIP International Conference on New Technologies, Mobility and Security, pp. 1–5 (2011). https://doi.org/10.1109/NTMS.2011.5721040
Xiaojun, Z., Chunxiang, X., Yuan, Z.: Fuzzy identity-based signature scheme from lattice and its application in biometric authentication. In: KSII Transactions On Internet And Informations System 11(5), p. 2762 (2017). https://doi.org/10.3837/tiis.2017.05.025
Yanhua, Z., Yupu, H., Yong, G., Yifeng, Y., Huiwen, J.: Efficient fuzzy identity-based signature from lattices for identities in a small (or large) universe. J. Info. Secu. Appl. 47 (2019). https://doi.org/10.1016/j.jisa.2019.04.012
Shan, X., You, L., Hu, G.: Two efficient constructions for biometric-based signature in identity-based setting using bilinear pairings. IEEE Access 9, 25973–25983 (2021). https://doi.org/10.1109/ACCESS.2021.3057064
Matsuda, T., Takahashi, K., Murakami, T., Hanaoka, G.: Fuzzy Signatures: Relaxing Requirements and a New Construction. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 97–116. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39555-5_6
Godfrey-Welch, D., Remy L., Jared L.: Blockchain in Payment Card Systems, p. 75205. Southern Methodist University, Dallas, Texas (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Badovinac, N., Simić, D. (2023). Biometric Creation of Digital Signatures and Their Application in Blockchain. In: Mihić, M., Jednak, S., Savić, G. (eds) Sustainable Business Management and Digital Transformation: Challenges and Opportunities in the Post-COVID Era. SymOrg 2022. Lecture Notes in Networks and Systems, vol 562. Springer, Cham. https://doi.org/10.1007/978-3-031-18645-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-18645-5_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-18644-8
Online ISBN: 978-3-031-18645-5
eBook Packages: EngineeringEngineering (R0)