Abstract
In the past years there has been much theoretical interest in secure extraction of robust strings from noisy measurements. In particular this technique allows extracting robust cryptographic keys from noisy biometric data. This paper starts with an overview of the ideas behind robust and secure string extraction in terms of information reconciliation, privacy amplification and helper data. The main part of the paper gives three application examples explaining how these techniques are used to enhance the convenience and security of devices (e.g. tokens) while preserving also the privacy of the user because neither biometric information nor secret cryptographic keys need to be stored on applications. We discuss a server access token, a 3-way check for a biometric ePassport and a password vault.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Brassard, G, Salvail, L.: Secret-key reconciliation by Public Discussion, Advances in Cryptology, EUROCRYPT’93, Springer Verlag, LNCS 765, 1994, p.410–423.
Gander, M. J., Maurer, U. M.: On the secret-key rate of binary random variables. Proc.1994 IEEE International Symposium on Information Theory, p.351, 1994.
Roger L. Kay, “Protecting Mobility”, IDC White paper, 2005 http://www.synaptics.com/support/Protecting_Mobility.pdf
Kevenaar, T. A. M, Schrijen, G. J., van der Veen, M., Akkermans, A. H. M. and Zuo, F.: Face Recognition with Renewable and Privacy Preserving Templates. Proc. 4th IEEE Workshop on Automatic Identification Advanced Technologies (AutolD 2005), Springer Verlag, LNCS 3546, 2005, p.21–25.
Linnartz, J. P and Tuyls P.: New shielding functions to enhance privacy and prevent misuse of biometric templates, Proc. 3rd Conf. Audio and Video Based Person Authentication (AVBPA 2003), Springer Verlag, LNCS 2688, 2003, p.238–250.
Maurer, U. M., Wolf, S.: Unconditional Secure Key Agreement and the Intrinsic Conditional Information, IEEE Trans. on Information Theory, Vol. 45, no. 2, 1999, p.499–514.
Tuyls P. and Goseling J.: Capacity and Examples of Template Protecting Biometric Authentication Systems, Proc. Biometric Authentication Workshop (BioAW, Prague 2004), Springer Verlag, LNCS 3087, 2004, p.158–170.
V. Shoup, “A Computational Introduction to Number Theory and Algebra”, Cambridge University Press 2005.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2006 Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Kevenaar, T., Schrijen, G.J., Akkermans, A., Damstra, M., Tuyls, P., van der Veen, M. (2006). Robust and Secure Biometrics: Some Application Examples. In: ISSE 2006 — Securing Electronic Busines Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9195-2_21
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9195-2_21
Publisher Name: Vieweg
Print ISBN: 978-3-8348-0213-2
Online ISBN: 978-3-8348-9195-2
eBook Packages: Computer ScienceComputer Science (R0)