[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Upmanyu et al., 2010 - Google Patents

Blind authentication: a secure crypto-biometric verification protocol

Upmanyu et al., 2010

View PDF
Document ID
13683906688849365691
Author
Upmanyu M
Namboodiri A
Srinathan K
Jawahar C
Publication year
Publication venue
IEEE transactions on information forensics and security

External Links

Snippet

Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and privacy. The use of cryptographic primitives to bolster the authentication process can alleviate some of these concerns as shown by …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Similar Documents

Publication Publication Date Title
Upmanyu et al. Blind authentication: a secure crypto-biometric verification protocol
Natgunanathan et al. Protection of privacy in biometric data
EP1964305B1 (en) Secure threshold decryption protocol computation
Yang et al. Fuzzy identity based signature with applications to biometric authentication
Bringer et al. Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends
Rane et al. Secure biometrics: Concepts, authentication architectures, and challenges
US8966277B2 (en) Method for authenticating an encryption of biometric data
Im et al. Practical privacy-preserving face authentication for smartphones secure against malicious clients
Šeděnka et al. Secure outsourced biometric authentication with performance evaluation on smartphones
Kumar et al. Development of a new cryptographic construct using palmprint-based fuzzy vault
Upmanyu et al. Efficient biometric verification in encrypted domain
Karabat et al. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system
Sarier Comments on biometric-based non-transferable credentials and their application in blockchain-based identity management
Sarier Multimodal biometric identity based encryption
Rajeswari et al. Multi-fingerprint unimodel-based biometric authentication supporting cloud computing
Kanade et al. Enhancing information security and privacy by combining biometrics with cryptography
Penn et al. Customisation of paillier homomorphic encryption for efficient binary biometric feature vector matching
Punithavathi et al. Partial DCT-based cancelable biometric authentication with security and privacy preservation for IoT applications
Nguyen et al. Privacy preserving biometric‐based remote authentication with secure processing unit on untrusted server
Ye et al. Anonymous biometric access control
Han et al. A novel hybrid crypto-biometric authentication scheme for ATM based banking applications
Al‐Saggaf Key binding biometrics‐based remote user authentication scheme using smart cards
Yang et al. Efficient and privacy-preserving online face recognition over encrypted outsourced data
Kumar et al. A palmprint-based cryptosystem using double encryption
Bauspieß et al. BRAKE: Biometric Resilient Authenticated Key Exchange