Upmanyu et al., 2009 - Google Patents
Efficient biometric verification in encrypted domainUpmanyu et al., 2009
View PDF- Document ID
- 17547978311171764657
- Author
- Upmanyu M
- Namboodiri A
- Srinathan K
- Jawahar C
- Publication year
- Publication venue
- Advances in Biometrics: Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings 3
External Links
Snippet
Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biometrics might reveal more information than the identity itself, as well as provide the ability to track …
- 238000000034 method 0 description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Upmanyu et al. | Blind authentication: a secure crypto-biometric verification protocol | |
Upmanyu et al. | Efficient biometric verification in encrypted domain | |
Yang et al. | Fuzzy identity based signature with applications to biometric authentication | |
US10050785B2 (en) | Secure threshold decryption protocol computation | |
Ahmad et al. | Pair-polar coordinate-based cancelable fingerprint templates | |
US8966277B2 (en) | Method for authenticating an encryption of biometric data | |
Šeděnka et al. | Secure outsourced biometric authentication with performance evaluation on smartphones | |
JP4929136B2 (en) | Biometric authentication method, apparatus and system | |
Kumar et al. | Development of a new cryptographic construct using palmprint-based fuzzy vault | |
Karabat et al. | THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system | |
Rajeswari et al. | Multi-fingerprint unimodel-based biometric authentication supporting cloud computing | |
Sarier | Multimodal biometric identity based encryption | |
Benhammadi et al. | Password hardened fuzzy vault for fingerprint authentication system | |
Zeroual et al. | Lightweight deep learning model to secure authentication in Mobile Cloud Computing | |
Penn et al. | Customisation of paillier homomorphic encryption for efficient binary biometric feature vector matching | |
Vallabhadas et al. | Securing multimodal biometric template using local random projection and homomorphic encryption | |
Punithavathi et al. | Partial DCT-based cancelable biometric authentication with security and privacy preservation for IoT applications | |
Li et al. | Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes | |
Han et al. | A novel hybrid crypto-biometric authentication scheme for ATM based banking applications | |
Bauspieß et al. | BRAKE: Biometric Resilient Authenticated Key Exchange | |
Wong et al. | A privacy-preserving biometric matching protocol for iris codes verification | |
Kuznetsov et al. | Deep learning-based biometric cryptographic key generation with post-quantum security | |
Sadkhan et al. | Survey of biometrie based key generation to enhance security of cryptosystems | |
Ding et al. | Achieving privacy-preserving iris identification via el gamal | |
Neha et al. | An efficient biometric based remote user authentication technique for multi-server environment |