The Server based Realtime Biometric Signature Scheme

Abstract In a biometric authentication scheme, a user’s biometric data that is unique to the user is used to prove the user’s identity to the third party. Since the user should have to participate in every authentication sessions, it's not possible to delegate other users to authenticate instead of himself/herself. In a biometric signature scheme, contrary to authentication scheme, a user’s biometric data is used to prove that “this message is signed by the signer who claims to be” to the third party. However, once the biometric key is created, it can be accessed by the signer. Thus, it’s possible to lend the biometric key to other users. In this study, the server based biometric realtime signature scheme is proposed. The proposed scheme can be applied to sign the vote in electronic voting or to authenticate the copyright owner in DRM enabled mobile commerce where the proxy signatures are not allowed. Key Words : Biometric Recognition, Biometric Signature, Realtime User Authentication, Proxy Signature Scheme, Electronic Voting

[1]  Carlos Vivaracho-Pascual,et al.  On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[2]  Gerrit Bleumer,et al.  Undeniable Signatures , 2011, Encyclopedia of Cryptography and Security.

[3]  Mohammed Yakoob Siyal,et al.  Novel biometric digital signatures for Internet-based applications , 2001, Inf. Manag. Comput. Secur..

[4]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[5]  David Chaum,et al.  Undeniable Signatures , 1989, CRYPTO.

[6]  Roy Want iPhone: Smarter Than the Average Phone , 2010, IEEE Pervasive Computing.

[7]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[8]  N. Kiyavash,et al.  Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .

[9]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[10]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.