Skip to main content

Practical Digital Signature Generation Using Biometrics

  • Conference paper
Computational Science and Its Applications – ICCSA 2004 (ICCSA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3043))

Included in the following conference series:

Abstract

It is desirable to generate a digital signature using biometrics but not practicable because of its inaccurate measuring and potential hill-climbing attacks, without using specific hardware devices that hold signature keys or biometric templates securely. We study a simple practical method for biometrics based digital signature generation without such restriction, by exploiting the existing tools in software in our proposed model where a general digital signature such as RSA can be applied without losing its security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellare, M., Sandhu, R.: The security of practical two-party RSA signature schemes (2001) (manuscript)

    Google Scholar 

  2. Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society (AMS) 46(2), 203–213 (1999)

    MATH  MathSciNet  Google Scholar 

  3. Boneh, D., Durfee, G.: Cryptanalysis of RSA with private key d less than N0.292. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 1–11. Springer, Heidelberg (1999) and IEEE Trans. on Information Theory 46(4) (2000)

    Google Scholar 

  4. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Boyd, C.: Digital multisignatures, Cryptography and Coding, pp. 241–246. Oxford University Press, Oxford (1989)

    Google Scholar 

  6. Brands, S.: Rethinking public key infrastructures and digital certificates, p.11 and pp. 219–224. The MIT Press, Cambridge (2000)

    Google Scholar 

  7. Burke, H.E.: Handbook of bar Coding Systems. Van Nostrand Reinhold, New York (1984)

    Google Scholar 

  8. Daon Inc., Biometric Authentication & Digital Signatures for the Pharmaceutical Industry, White paper available at http://www.daon.com/downloads/publications/esignature.pdf

  9. Daugman, J.: High confidence personal identifications by rapid video analysis of iris texture. In: IEEE International Carnahan Conference on Security Technologies, pp. 50–60 (1992)

    Google Scholar 

  10. Daugman, J.: High confidence personal identifications by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15(11), 648–656 (1993)

    Article  Google Scholar 

  11. Davida, G., Frankel, Y., Matt, B.: On enabling secure applications through offline biometric identification. In: IEEE Symposium on Security and Privacy, pp. 148–159 (1998)

    Google Scholar 

  12. Denso Inc., QRmaker: User’s Manual, Denso Corporation, Aichi, Japan (1998)

    Google Scholar 

  13. Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing 17(2), 281–308 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  14. Jain, A., Hong, L., Pankanti, S.: Biometric identification. Communications of the ACM (February 2000)

    Google Scholar 

  15. Janbandhu, P., Siyal, M.: Novel biometric digital signatures for Internet-based applications. Information Management & Computer Security 9(5), 205–212 (2001)

    Article  Google Scholar 

  16. Matyáš, V., Říha, Z.: Biometric authentication - security and usability, Manuscrypt available at http://www.fi.muni.cz/usr/matyas/cms_matyas_riha_biometrics.pdf

  17. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, pp. 287–291 and 312–315. CRC Press, Boca Raton (1997)

    Google Scholar 

  18. Nagpal, R., Nagpal, S.: Biometric based digital signature scheme, Internet- Draft, draft-nagpal-biometric-digital-signature-00.txt (May 2002)

    Google Scholar 

  19. Palmer, R.C.: The Bar Code Book, 3rd edn. Helmers Publishing, Peterborough (1995)

    Google Scholar 

  20. Orvos, P.: Towards biometric digital signatures. In: Networkshop, Eszterhazy College, Eger, March 2002, pp. 26–28 (2002)

    Google Scholar 

  21. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  22. Soutar, C.: Biometric system performance and security, Manuscrypt available at http://www.bioscrypt.com/assets/bio_paper.pdf (2002)

  23. Soutar, C., Roberge, D., Stoianov, A., Golroy, R., Vijaya Kumar, B.: Biometric Encryption, ICSA Guide to Cryptography, McGraw-Hill (1999), also available at http://www.bioscrypt.com/assets/Biometric_Encryption.pdf

  24. Wiener, M.: Cryptanalysis of short RSA secret exponents. IEEE Transactions on Information Theory 36(3) (May 1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kwon, T., Lee, Ji. (2004). Practical Digital Signature Generation Using Biometrics. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_85

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24707-4_85

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22054-1

  • Online ISBN: 978-3-540-24707-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics