Abstract
Existing biometric authentication systems use probabilistic method to decide the claimed identity of a user. But, these are weak on the privacy protection perspective as anyone can access someone’s biometric template without restrictions. Therefore, we propose a scheme that can improve the biometric authentication accuracy with the concept of digital signature with biometric digital key. By using these biometric digital key pairs, each entity(sender) can mutually authenticate the others based on the biometric certificate on open network.
This work was supported by the Korea Research Foundation Grant funded by the Korean Government (MOEHRD, Basic Research Promotion Fund) (KRF-2006-311-D00857).
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)
Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society (AMS) 46(2), 203–213 (1999)
ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Transactions on Information Theory 30(4), 469–472 (1985)
Juels, A., Sudan, M.: A Fuzzy Vault Scheme, also available at http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/fuzzy-vault/fuzzy_vault.pdf
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, pp. 312–315. CRC Press, Boca Raton (1997)
Hong, L., Wan, Y., Jain, A.K.: Fingerprint image enhancement: Algorithm and performance evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence 8, 777–789 (1998)
Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)
Daon Inc. Biometric Authentication & Digital Signatures for the Pharmaceutical Industry, White paper, available at http://www.daon.com/downloads/publications/esignature.pdf
Daugman, J.: High confidence personal identifications by rapid video analysis of iris texture. In: IEEE Intern. Carnahan Conference on Security Technologies, pp. 50–60 (1992)
Daugman, J.: High confidence personal identifications by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15(11), 648–656 (1993)
Davida, G., Frankel, Y., Matt, B.: On enabling secure applications through off-line biometric identification. In: IEEE Symposium on Security and Privacy, pp.148–159 (1998)
Soutar, C., Roberge, D., Stoianov, A., Golroy, R., Kumar, B.V.: Biometric Encryption, In: ICSA Guide to Cryptography (1999), also available at http://www.bioscrypt.com/assets/
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to generate strong keys from biometric identification. In: Proceedings of the IEEE Security and Privacy (1998)
Orvos, P.: Towards biometric digital signatures. In: Networkshop, Eszterhazy College, Eger, pp. 26–28, (March 2002)
Nagpal, R., Nagpal, S.: Biometric based digital signature scheme. In: Internet-Draft, draft-nagpal-biometric-digital-signature-00.txt (May 2002)
Jain, A., Hong, L., Pankanti, S.: Biometric identification. Communications of the ACM (February 2000)
Janbandhu, P., Siyal, M.: Novel biometric digital signatures for Internet-based applications. Information Management & Computer Security 9(5), 205–212 (2001)
Kwon, T., Lee, J.: Practical digital signature generation using biometrics. In: Laganà, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, Springer, Heidelberg (2004)
Matyas, V., Rıha, Z.: Biometric authentication security and usability. Manuscrypt, available at http://www.fi.muni.cz/usr/matyas/cms_matyas_riha_biometrics.pdf
Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometrics. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147–163. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, HW., Kwon, T. (2007). Biometric Digital Key Mechanisms for Telebiometric Authentication Based on Biometric Certificate. In: Stephanidis, C. (eds) Universal Acess in Human Computer Interaction. Coping with Diversity. UAHCI 2007. Lecture Notes in Computer Science, vol 4554. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73279-2_48
Download citation
DOI: https://doi.org/10.1007/978-3-540-73279-2_48
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73278-5
Online ISBN: 978-3-540-73279-2
eBook Packages: Computer ScienceComputer Science (R0)