2012
DOI: 10.1109/tifs.2012.2184092
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems

Abstract: In this paper we analyze the vulnerabilities of biometric authentication protocols with respect to user and data privacy. The goal of an adversary in such context is not to bypass the authentication but to learn information either on biometric data or on users that are in the system. We elaborate our analysis on a general system model involving four logical entities (sensor, server, database and matcher), and we focus on internal adversaries to encompass the situation where one or a combination of these entiti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
64
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 94 publications
(64 citation statements)
references
References 27 publications
0
64
0
Order By: Relevance
“…For a detailed description of the adversarial model, we refer the reader to, for example, [15][16][17]. Below, we list the four main threats that afflict privacy-preserving biometric authentication systems [18].…”
Section: Main Threats Against Privacy-preserving Biometric Authenticamentioning
confidence: 99%
“…For a detailed description of the adversarial model, we refer the reader to, for example, [15][16][17]. Below, we list the four main threats that afflict privacy-preserving biometric authentication systems [18].…”
Section: Main Threats Against Privacy-preserving Biometric Authenticamentioning
confidence: 99%
“…As an example CS could compute gpEncpb i q, Encpvqq, where v is a chosen vector by CS, and subsequently send the result to SP, which outputs Out SP . By mounting a variant of the hill climbing attack [5], performing multiple repeated attempts, each time carefully choosing v, the stored template b i can be retrieved. Such attacks against several protocols proposed in [6][7][8] are presented in [9][10][11].…”
Section: Introductionmentioning
confidence: 99%
“…Bringer et al [8] proposed a distributed biometric authentication protocol using the Goldwasser-Micali cryptosystem [15] to protect the privacy of the biometric templates against honest-but-curious (or passive) adversaries. Nevertheless, some attacks on this protocol were reported in [5,11,18]. In [11], the authors have also improved upon the Bringer et al protocol to achieve security against malicious but non-colluding adversaries.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition to this, there are a number of studies pointing out the privacy leakage of biometric applications [37,38] as well as biometric template protection methods [14,15,39]. In the literature, Zhou et al propose a framework for security and privacy assessment of the biometric template protection methods [14].…”
Section: Introductionmentioning
confidence: 99%