DOI: 10.3990/1.9789036527385
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic keys from noisy data : theory and applications

Abstract: Biometric security systems that verify a person's identity by scanning fingers, hands, eye or face are becoming more and more common. As a result biometrics is one of the fastest growing industries. Applications for biometrics range from homeland security (for example the European biometric passport), physical access to various facilities (banks, amusement parks, office buildings, computer terminals, etc) and health and social services.Utilizing biometrics for personal authentication is more convenient and tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 78 publications
0
3
0
Order By: Relevance
“…The drawback of these authentication protocols is that they can only authenticate the subject, but they cannot produce the cryptographic keys required for secure communication. The "Secure Ad-hoc Pairing with Biometrics: SAfE" protocol proposed by Buhan et al [10] uses the fuzzy extractor scheme and can be used to establish a secure link between two parties. Unlike many biometrics-based protocols, this protocol does not involve a biometric template database or server.…”
Section: Fig 2 Most Common Minutiae Points [16]mentioning
confidence: 99%
“…The drawback of these authentication protocols is that they can only authenticate the subject, but they cannot produce the cryptographic keys required for secure communication. The "Secure Ad-hoc Pairing with Biometrics: SAfE" protocol proposed by Buhan et al [10] uses the fuzzy extractor scheme and can be used to establish a secure link between two parties. Unlike many biometrics-based protocols, this protocol does not involve a biometric template database or server.…”
Section: Fig 2 Most Common Minutiae Points [16]mentioning
confidence: 99%
“…The "Secure Ad-hoc Pairing with Biometrics: SAfE" protocol proposed by Buhan et al [30,29] (2007) is a protocol which can be used to establish a secure link between two parties. Keys are obtained from biometrics with the help of the fuzzy extractor scheme.…”
Section: Review Of Biometrics Based Secure Cryptographic Protocols 34mentioning
confidence: 99%
“…Buhan et al [30,29] (2007) is a protocol which can be used to establish a secure link between two parties. Keys are obtained from biometrics with the help of the fuzzy extractor scheme.…”
Section: Review Of Biometrics Based Secure Cryptographic Protocols 34mentioning
confidence: 99%