Abstract
A biometric identification system was recently developed and analyzed as a secure mechanism for user authentication. The system provided for the confidentiality, without the use of cryptographic encryption, of the user’s biometric information stored in public verification templates.
Here we demonstrate that the use of majority decoding can enhance the prior techniques in several ways. One enhancement allows the biometric authentication system to leak no information about a user’s biometric when using the proper computational assumptions. Another enhancement is a passive identification system.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
F. Bouchier, J.S. Ahrens, and G. Wells. Laboratory evaluation of the iriscan prototype biometric identifier. Technical Report SAND96-1033, Sandia National Laboratories USA, April 1996.
E.R. Berlekamp. Algebraic Coding Theory. McGraw-Hill, 1968.
M. Bellare and R. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. In Proceedings of the 1st ACM conference on Computers and Communications Security, 1993.
R. Canetti. Towards realizing random oracles: Hash functions which hide all partial information. In Advances in Cryptology. Proc. of Crypto’97, pages 455–469, 1997.
J. Daugman. High confidence personal identifications by rapid video analysis of iris texture. In IEEE International Carnahan Conference on Security Technology, pages 50–60, 1992.
J. Daugman. High confidence personal identifications by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence, 15(11):648–656, November 1993.
G.I. Davida, Y. Frankel, and B.J. Matt. On enabling secure applications through off-line biometric identification. In 1998 IEEE Symposium on Security and Privacy, pages 148–157, 1998.
G.I. Davida, Y. Frankel, B. Matt and R. Peralta, ’On the relation of error correction and cryptography to an offine biometric based identification scheme. In Proceedings of the Workshop on Codes and Cryptography 1999.
J.P. Holmes, R.L. Maxell, and L.J. Wright. A performance evaluation of biometric identification devices. Technical report, Sandia National Laboratories, July 1990.
F.J. MacWilliams and N.J.A. Sloane. The theory of error-correcting codes. North-Holland Publishing Company, 1978.
W. W. Peterson and E.J. Weldon. Error Correcting Codes. The MIT Press, 1988.
G.O. Williams. Iris recognition technology. In IEEE International Carnahan Conference on Security Technology, pages 46–59, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Davida, G.I., Frankel, Y. (1999). Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System. In: Walker, M. (eds) Cryptography and Coding. Cryptography and Coding 1999. Lecture Notes in Computer Science, vol 1746. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46665-7_11
Download citation
DOI: https://doi.org/10.1007/3-540-46665-7_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66887-9
Online ISBN: 978-3-540-46665-9
eBook Packages: Springer Book Archive