2011
DOI: 10.1002/sec.136
|View full text |Cite
|
Sign up to set email alerts
|

Achieving non‐transferability in credential systems using hidden biometrics

Abstract: In credential systems, which allow the construction of privacy-preserving access control infrastructures in online environments, credential transfer occurs when Alice gives her private key to another entity who can then freely use Alice's credential as if it was his/her own. Prior approaches to limit credential transfer require tamper-resistant user hardware, or are ineffective against closely knit groups of users who are willing to share personal or valuable information with each other. In this paper we propo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 35 publications
0
9
0
Order By: Relevance
“…We do so by comparing the 2011 protocol proposed by Adams [1], (Alg 0 ) with the protocol proposed in this work. We refer to these as Alg 0 and Alg 1 , respectively.…”
Section: Performancementioning
confidence: 97%
See 4 more Smart Citations
“…We do so by comparing the 2011 protocol proposed by Adams [1], (Alg 0 ) with the protocol proposed in this work. We refer to these as Alg 0 and Alg 1 , respectively.…”
Section: Performancementioning
confidence: 97%
“…4) embedded biometric approaches include the direct use of a biometric within the credential, and necessarily some manner of distance comparison to establish identity. Approaches such as these have been proposed including Brands [8], and Adams [1]. In general, these approaches suffer the weakness that biometric is directly used: privacy is not protected.…”
Section: Non-transferabilitymentioning
confidence: 98%
See 3 more Smart Citations