A novel crypto-biometric scheme for establishing secure communication sessions between two clients

作者: Bernadette Dorizzi , Sanjay G. Kanade , Dijana Petrovska-Delacretaz

DOI:

关键词: Cryptographic protocolCryptographyComputer securityComputer scienceMutual authenticationInformation privacyBiometricsSession keyAuthentication protocolStrong authentication

摘要: Biometrics and cryptography are two tools which have high potential for providing information security privacy. A combination of these can eliminate their individual shortcomings, such as non-revocability, non-diversity, privacy issues in biometrics need strong authentication cryptography. Crypto-biometric systems combine techniques from purposes, more interestingly, to obtain based cryptographic keys. In this paper, we address the problem sharing We propose a crypto-biometric scheme clients share session key securely establish secure communication session. The involves Central Authority Registration Authentication (CARA) with registered. CARA stores biometric data only transformed, cancelable form, allowing easy revocation templates protecting There distinctive features protocol (1) it achieves mutual starts between may be previously unknown each other, (2) works even if use different modalities same (as well different)

参考文章(30)
Yoshifumi Ueshige, Kouichi Sakurai, A Proposal of One-Time Biometric Authentication. 2006 International Conference on Security and Management, SAM'06. pp. 78- 83 ,(2006)
Mohamed Abid, Hossam Afifi, Towards a secure E-passport protocol based on biometrics information assurance and security. ,vol. 4, pp. 338- 345 ,(2009)
Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer, An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication Information Security and Privacy. pp. 96- 106 ,(2007) , 10.1007/978-3-540-73458-1_8
Qiang Tang, Julien Bringer, Hervé Chabanne, David Pointcheval, A formal study of the privacy concerns in biometric-based remote authentication schemes information security practice and experience. ,vol. 4991, pp. 56- 70 ,(2008) , 10.1007/978-3-540-79104-1_5
Alessandra Lumini, Loris Nanni, An improved BioHashing for human authentication Pattern Recognition. ,vol. 40, pp. 1057- 1065 ,(2007) , 10.1016/J.PATCOG.2006.05.030
Ari Juels, Martin Wattenberg, A fuzzy commitment scheme computer and communications security. pp. 28- 36 ,(1999) , 10.1145/319709.319714
Shafi Goldwasser, Silvio Micali, Probabilistic encryption & how to play mental poker keeping secret all partial information Proceedings of the fourteenth annual ACM symposium on Theory of computing - STOC '82. pp. 365- 377 ,(1982) , 10.1145/800070.802212
Bernadette Dorizzi, Sanjay G. Kanade, Dijana Petrovska-Delacrétaz, Enhancing Information Security and Privacy: Combining Biometrics & Cryptography ,(2012)
Anil K Jain, Karthik Nandakumar, Abhishek Nagar, Biometric template security EURASIP Journal on Advances in Signal Processing. ,vol. 2008, pp. 113- ,(2008) , 10.1155/2008/579416