[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Upmanyu et al., 2009 - Google Patents

Efficient biometric verification in encrypted domain

Upmanyu et al., 2009

View PDF
Document ID
17547978311171764657
Author
Upmanyu M
Namboodiri A
Srinathan K
Jawahar C
Publication year
Publication venue
Advances in Biometrics: Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings 3

External Links

Snippet

Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biometrics might reveal more information than the identity itself, as well as provide the ability to track …
Continue reading at cdn.iiit.ac.in (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Similar Documents

Publication Publication Date Title
Upmanyu et al. Blind authentication: a secure crypto-biometric verification protocol
Upmanyu et al. Efficient biometric verification in encrypted domain
Yang et al. Fuzzy identity based signature with applications to biometric authentication
US10050785B2 (en) Secure threshold decryption protocol computation
Ahmad et al. Pair-polar coordinate-based cancelable fingerprint templates
US8966277B2 (en) Method for authenticating an encryption of biometric data
Šeděnka et al. Secure outsourced biometric authentication with performance evaluation on smartphones
JP4929136B2 (en) Biometric authentication method, apparatus and system
Kumar et al. Development of a new cryptographic construct using palmprint-based fuzzy vault
Karabat et al. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system
Rajeswari et al. Multi-fingerprint unimodel-based biometric authentication supporting cloud computing
Sarier Multimodal biometric identity based encryption
Benhammadi et al. Password hardened fuzzy vault for fingerprint authentication system
Zeroual et al. Lightweight deep learning model to secure authentication in Mobile Cloud Computing
Penn et al. Customisation of paillier homomorphic encryption for efficient binary biometric feature vector matching
Vallabhadas et al. Securing multimodal biometric template using local random projection and homomorphic encryption
Punithavathi et al. Partial DCT-based cancelable biometric authentication with security and privacy preservation for IoT applications
Li et al. Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes
Han et al. A novel hybrid crypto-biometric authentication scheme for ATM based banking applications
Bauspieß et al. BRAKE: Biometric Resilient Authenticated Key Exchange
Wong et al. A privacy-preserving biometric matching protocol for iris codes verification
Kuznetsov et al. Deep learning-based biometric cryptographic key generation with post-quantum security
Sadkhan et al. Survey of biometrie based key generation to enhance security of cryptosystems
Ding et al. Achieving privacy-preserving iris identification via el gamal
Neha et al. An efficient biometric based remote user authentication technique for multi-server environment