An Authentication Protocol with Encrypted Biometric Data

Author(s):  
Julien Bringer ◽  
Hervé Chabanne
2014 ◽  
Vol 931-932 ◽  
pp. 1437-1440
Author(s):  
Anongporn Salaiwarakul

The secure remote biometric authentication protocol proposed in this paper solves the problem from the nature of the biometric data. The proposed protocol preserves the privacy of the users biometric data when it is transmitted in the protocol. The liveness property of the protocol guarantees that the biometric data used to authenticate the user comes from the live presentation of the user. The most important property related with the intentional authentication; it confirms that the purpose of the user authentication correspondences to the users purpose. The proposed secure remote biometric authentication protocol promises three properties so that the user is confident with the security level that the protocol offers and it guarantees that the protocol does not manipulate with an intruder.


2018 ◽  
Vol 2018 ◽  
pp. 1-14
Author(s):  
Minhye Seo ◽  
Jong Hwan Park ◽  
Youngsam Kim ◽  
Sangrae Cho ◽  
Dong Hoon Lee ◽  
...  

Biometric data is user-identifiable and therefore methods to use biometrics for authentication have been widely researched. Biometric cryptosystems allow for a user to derive a cryptographic key from noisy biometric data and perform a cryptographic task for authentication or encryption. The fuzzy extractor is known as a prominent biometric cryptosystem. However, the fuzzy extractor has a drawback in that a user is required to store user-specific helper data or receive it online from the server with additional trusted channel, to derive a correct key. In this paper, we present a new biometric-based key derivation function (BB-KDF) to address the issues. In our BB-KDF, users are able to derive cryptographic keys solely from their own biometric data: users do not need any other user-specific helper information. We introduce a security model for the BB-KDF. We then construct the BB-KDF and prove its security in our security model. We then propose an authentication protocol based on the BB-KDF. Finally, we give experimental results to analyze the performance of the BB-KDF. We show that our proposed BB-KDF is computationally efficient and can be deployed on many different kinds of devices.


2018 ◽  
Vol 5 (4) ◽  
pp. 1-5
Author(s):  
Na Yea Oh ◽  
Hee Soo Kim ◽  
Jin Wan Park
Keyword(s):  

2019 ◽  
Vol 15 (4) ◽  
pp. 784-794
Author(s):  
N.V. Kormil'tsev ◽  
◽  
A.D. Uvarov ◽  
A.A. Mikhailov ◽  
M.V. Tumbinskaya ◽  
...  

2019 ◽  
Vol 7 (5) ◽  
pp. 1551-1557
Author(s):  
Arif Mohammad Abdul ◽  
Sudarson Jena ◽  
M Bal Raju

Author(s):  
Igor I. Koltunov ◽  
Anton V. Panfilov ◽  
Ivan A. Poselsky ◽  
Nikolay N. Chubukov ◽  
Ivan V. Krechetov ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document