Skip to main content

Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1746))

Abstract

A biometric identification system was recently developed and analyzed as a secure mechanism for user authentication. The system provided for the confidentiality, without the use of cryptographic encryption, of the user’s biometric information stored in public verification templates.

Here we demonstrate that the use of majority decoding can enhance the prior techniques in several ways. One enhancement allows the biometric authentication system to leak no information about a user’s biometric when using the proper computational assumptions. Another enhancement is a passive identification system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. F. Bouchier, J.S. Ahrens, and G. Wells. Laboratory evaluation of the iriscan prototype biometric identifier. Technical Report SAND96-1033, Sandia National Laboratories USA, April 1996.

    Google Scholar 

  2. E.R. Berlekamp. Algebraic Coding Theory. McGraw-Hill, 1968.

    Google Scholar 

  3. M. Bellare and R. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. In Proceedings of the 1st ACM conference on Computers and Communications Security, 1993.

    Google Scholar 

  4. R. Canetti. Towards realizing random oracles: Hash functions which hide all partial information. In Advances in Cryptology. Proc. of Crypto’97, pages 455–469, 1997.

    Google Scholar 

  5. J. Daugman. High confidence personal identifications by rapid video analysis of iris texture. In IEEE International Carnahan Conference on Security Technology, pages 50–60, 1992.

    Google Scholar 

  6. J. Daugman. High confidence personal identifications by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence, 15(11):648–656, November 1993.

    Article  Google Scholar 

  7. G.I. Davida, Y. Frankel, and B.J. Matt. On enabling secure applications through off-line biometric identification. In 1998 IEEE Symposium on Security and Privacy, pages 148–157, 1998.

    Google Scholar 

  8. G.I. Davida, Y. Frankel, B. Matt and R. Peralta, ’On the relation of error correction and cryptography to an offine biometric based identification scheme. In Proceedings of the Workshop on Codes and Cryptography 1999.

    Google Scholar 

  9. J.P. Holmes, R.L. Maxell, and L.J. Wright. A performance evaluation of biometric identification devices. Technical report, Sandia National Laboratories, July 1990.

    Google Scholar 

  10. F.J. MacWilliams and N.J.A. Sloane. The theory of error-correcting codes. North-Holland Publishing Company, 1978.

    Google Scholar 

  11. W. W. Peterson and E.J. Weldon. Error Correcting Codes. The MIT Press, 1988.

    Google Scholar 

  12. G.O. Williams. Iris recognition technology. In IEEE International Carnahan Conference on Security Technology, pages 46–59, 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Davida, G.I., Frankel, Y. (1999). Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System. In: Walker, M. (eds) Cryptography and Coding. Cryptography and Coding 1999. Lecture Notes in Computer Science, vol 1746. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46665-7_11

Download citation

  • DOI: https://doi.org/10.1007/3-540-46665-7_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66887-9

  • Online ISBN: 978-3-540-46665-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics