Biometric Digital Key Mechanisms for Telebiometric Authentication Based on Biometric Certificate

Existing biometric authentication systems use probabilistic method to decide the claimed identity of a user. But, these are weak on the privacy protection perspective as anyone can access someone's biometric template without restrictions. Therefore, we propose a scheme that can improve the biometric authentication accuracy with the concept of digital signature with biometric digital key. By using these biometric digital key pairs, each entity(sender) can mutually authenticate the others based on the biometric certificate on open network

[1]  Anil K. Jain,et al.  Fingerprint Image Enhancement: Algorithm and Performance Evaluation , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[2]  Mohammed Yakoob Siyal,et al.  Novel biometric digital signatures for Internet-based applications , 2001, Inf. Manag. Comput. Secur..

[3]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[4]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[5]  Alfred C. Weaver,et al.  Biometric authentication , 2006, Computer.

[6]  Václav Matyás,et al.  Biometric authentication - security and usability , 2002, Communications and Multimedia Security.

[7]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[8]  Rafail Ostrovsky,et al.  Secure Remote Authentication Using Biometrics , 2005 .

[9]  Taekyoung Kwon,et al.  Practical Digital Signature Generation Using Biometrics , 2004, ICCSA.

[10]  Dan Boneh,et al.  TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .

[11]  Shuchi Nagpal,et al.  Biometric based Digital Signature scheme , 2002 .

[12]  Ronald Cramer,et al.  Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.

[13]  Antonio Laganà,et al.  Computational Science and Its Applications – ICCSA 2004 , 2004, Lecture Notes in Computer Science.

[14]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[15]  J. G. Daugman High confidence personal identification by rapid video analysis of iris texture , 1992, Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures.

[16]  John Daugman,et al.  High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[17]  Rafail Ostrovsky,et al.  Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.

[18]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[19]  Pim Tuyls,et al.  Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.