Generating and sharing biometrics based session keys for secure cryptographic applications

作者: Sanjay Kanade , Dijana Petrovska-Delacretaz , Bernadette Dorizzi

DOI: 10.1109/BTAS.2010.5634545

关键词: Trusted third partyKey managementPublic-key cryptographySession (computer science)Cryptographic protocolKey (cryptography)Cryptographic primitiveComputer securityComputer scienceSession key

摘要: Crypto-biometric systems, which combine biometrics with cryptographic are gaining more and attention. Person verification high degree of assurance offered by can greatly improve the security a system. In such stable crypto-biometric key (to be used for cryptography) is derived from strong link between user identity keys established. this paper, we first propose simple effective protocol to securely share keys. Moreover, another generate session valid only one communication session. This achieves mutual authentication client server without need trusted third party certificates. also facilitates easy online updating templates. The stored templates cancelable. protocols evaluated biometrie performance on subset NIST-FRG02 face database.

参考文章(25)
Yoshifumi Ueshige, Kouichi Sakurai, A Proposal of One-Time Biometric Authentication. 2006 International Conference on Security and Management, SAM'06. pp. 78- 83 ,(2006)
P. Jonathon Phillips, Face Recognition Grand Challenge ,(2004)
Boris Škorić, None, Security with noisy data information hiding. ,vol. 6387, pp. 48- 50 ,(2010) , 10.1007/978-3-642-16435-4_4
Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer, An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication Information Security and Privacy. pp. 96- 106 ,(2007) , 10.1007/978-3-540-73458-1_8
J. Ross Beveridge, David Bolme, Bruce A. Draper, Marcio Teixeira, The CSU Face Identification Evaluation System machine vision applications. ,vol. 16, pp. 128- 138 ,(2005) , 10.1007/S00138-004-0144-7
Qiang Tang, Julien Bringer, Hervé Chabanne, David Pointcheval, A formal study of the privacy concerns in biometric-based remote authentication schemes information security practice and experience. ,vol. 4991, pp. 56- 70 ,(2008) , 10.1007/978-3-540-79104-1_5
Alessandra Lumini, Loris Nanni, An improved BioHashing for human authentication Pattern Recognition. ,vol. 40, pp. 1057- 1065 ,(2007) , 10.1016/J.PATCOG.2006.05.030
Ari Juels, Martin Wattenberg, A fuzzy commitment scheme computer and communications security. pp. 28- 36 ,(1999) , 10.1145/319709.319714
M. Lades, J.C. Vorbruggen, J. Buhmann, J. Lange, C. von der Malsburg, R.P. Wurtz, W. Konen, Distortion invariant object recognition in the dynamic link architecture IEEE Transactions on Computers. ,vol. 42, pp. 300- 311 ,(1993) , 10.1109/12.210173