Skip to main content
Log in

Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures

  • Regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Conventional biometric authentication methods have a serious problem – it is easy to steal the biological information of another person, such as fingerprints, iris patterns, and facial forms. Accordingly, it is essential to protect authentication systems from an attack like impersonation with an artificial finger. To solve this problem, in this paper, we would like to propose a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures.

This paper has two new aspects: one is to propose a method for embedding two kinds of data – personal biological information and a confidential item corresponding to a conventional secret key – into a cryptosystem key to detect any impersonation even if the biological information is stolen, and the other is to demonstrate the safety of the method, a factor which has never been referenced.

From a privacy protection point of view, we believe that the multifactor biometric authentication method is of great significance. Moreover, it can economically establish certification authorities having the biological information.

Meanwhile, in order to uniquely embed the biological information into the cryptosystem key, an algorithm is needed to uniquely select a representative template as described in this paper. In this paper, we propose only the concept of this algorithm and hope that concrete methodologies will be studied in the future.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Tomoyuki K et al (1999) Cutting-edge biometric personal authentication system. Inf Process 40(11):1072–1103

    Google Scholar 

  2. Seto Y (2002) Activities for standardizing biometric technologies. In: Proceedings of symposium, May, IEICE’s Tokyo Branch

  3. Isobe Y, Seto Y, Kataoka M (2001) Development of personal authentication system using fingerprint with digital signature technologies. In: IEEE Proceedings of the 34th Hawaii international conference on system science

  4. Tsuji S (1999) Private letter to Kaoru Kurosawa. Professor of Tokyo Institute of Technology, January

  5. Tsuji S (1999) Document for 3rd FAIT Meeting. August

  6. Tsujii S, Itakura Y, Yamaguchi H, Kitazawa A, Saito S, Kasahara M (2000) Public-key cryptographic scheme having a structure in which biological information is embedded into a secret key. In: IEICE Symposium (SCIS2000), D07, January 2000

  7. Itakura Y, Hashiyada M, Nagashima T, Tsujii S (2002) Proposal on personal identifiers generated from the STR information of DNA. Int J Inf Syst :149–160. Direct Object Identifier (DOI)10.1007/s 10207-002-0013-1

    Article  Google Scholar 

  8. Itakura Y, Nagashima T, Tsuji S (2002) Biometric personal authentication using DNA data. IPSJ J 43(8):2394–2404

    Google Scholar 

  9. Seto Y (2002) Biological authentication technologies. Kyoritsu Shuppan, Tokyo, pp 13

  10. Okamoto T (1995) Probably secure and practical identification schemes and corresponding signature schemes. In: Proceedings of Crypto ’92. Lecture notes in computer science, vol 740. Springer, Berlin Heidelberg New York, pp 31–53

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yukio Itakura.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Itakura, Y., Tsujii, S. Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. Int J Inf Secur 4, 288–296 (2005). https://doi.org/10.1007/s10207-004-0065-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-004-0065-5

Keywords

Navigation