Upmanyu et al., 2010 - Google Patents
Blind authentication: a secure crypto-biometric verification protocolUpmanyu et al., 2010
View PDF- Document ID
- 13683906688849365691
- Author
- Upmanyu M
- Namboodiri A
- Srinathan K
- Jawahar C
- Publication year
- Publication venue
- IEEE transactions on information forensics and security
External Links
Snippet
Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and privacy. The use of cryptographic primitives to bolster the authentication process can alleviate some of these concerns as shown by …
- 238000000034 method 0 abstract description 31
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Upmanyu et al. | Blind authentication: a secure crypto-biometric verification protocol | |
Natgunanathan et al. | Protection of privacy in biometric data | |
EP1964305B1 (en) | Secure threshold decryption protocol computation | |
Yang et al. | Fuzzy identity based signature with applications to biometric authentication | |
Bringer et al. | Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends | |
Rane et al. | Secure biometrics: Concepts, authentication architectures, and challenges | |
US8966277B2 (en) | Method for authenticating an encryption of biometric data | |
Im et al. | Practical privacy-preserving face authentication for smartphones secure against malicious clients | |
Šeděnka et al. | Secure outsourced biometric authentication with performance evaluation on smartphones | |
Kumar et al. | Development of a new cryptographic construct using palmprint-based fuzzy vault | |
Upmanyu et al. | Efficient biometric verification in encrypted domain | |
Karabat et al. | THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system | |
Sarier | Comments on biometric-based non-transferable credentials and their application in blockchain-based identity management | |
Sarier | Multimodal biometric identity based encryption | |
Rajeswari et al. | Multi-fingerprint unimodel-based biometric authentication supporting cloud computing | |
Kanade et al. | Enhancing information security and privacy by combining biometrics with cryptography | |
Penn et al. | Customisation of paillier homomorphic encryption for efficient binary biometric feature vector matching | |
Punithavathi et al. | Partial DCT-based cancelable biometric authentication with security and privacy preservation for IoT applications | |
Nguyen et al. | Privacy preserving biometric‐based remote authentication with secure processing unit on untrusted server | |
Ye et al. | Anonymous biometric access control | |
Han et al. | A novel hybrid crypto-biometric authentication scheme for ATM based banking applications | |
Al‐Saggaf | Key binding biometrics‐based remote user authentication scheme using smart cards | |
Yang et al. | Efficient and privacy-preserving online face recognition over encrypted outsourced data | |
Kumar et al. | A palmprint-based cryptosystem using double encryption | |
Bauspieß et al. | BRAKE: Biometric Resilient Authenticated Key Exchange |