2005
DOI: 10.1007/s10207-004-0065-5
|View full text |Cite
|
Sign up to set email alerts
|

Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures

Abstract: Conventional biometric authentication methods have a serious problem -it is easy to steal the biological information of another person, such as fingerprints, iris patterns, and facial forms. Accordingly, it is essential to protect authentication systems from an attack like impersonation with an artificial finger. To solve this problem, in this paper, we would like to propose a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. This paper has two new aspects:… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…When we take typical values for the parameters in Table 2, we obtain the following relations. For biometric modalities with M ¼ 512 bytes template sizes (Itakura and Tsujii, 2005) and for 160-bit ECC curves, M % kP, if 20rk r30 as implemented in Sutcu et al (2006) and Mansukhani et al (2007). Also, for current PIR systems with communication cost PIR, we have PIR 5OðNÞ.…”
Section: Efficiency Of the Protocolmentioning
confidence: 99%
“…When we take typical values for the parameters in Table 2, we obtain the following relations. For biometric modalities with M ¼ 512 bytes template sizes (Itakura and Tsujii, 2005) and for 160-bit ECC curves, M % kP, if 20rk r30 as implemented in Sutcu et al (2006) and Mansukhani et al (2007). Also, for current PIR systems with communication cost PIR, we have PIR 5OðNÞ.…”
Section: Efficiency Of the Protocolmentioning
confidence: 99%
“…Thus, classical biometric user verification is involved in this configuration which provides the verification result and based on which the key (or some parameters An example of this system can be found in Itakura and Tsujii [59] where some secret parameters are released upon successful biometric verification. The released parameters are required to obtain the cryptographic keys.…”
Section: Cryptographic Key Release Based On Biometric Verificationmentioning
confidence: 99%
“…Although a simple client server biometric authentication system is proposed in [11], the decision can be computed after a decryption operation as in the schemes summarized in [7], thus the leakage of the system's secret keys endangers the security of the system. Besides, MFBA systems are proposed in [12], [13], [14], [15], [16], where the last two schemes performs the matching on card for a local authentication followed by a remote authentication. Also, cancelable biometrics is combined with a smart card for storing only the helper information [17], [18] for a MFBA.…”
Section: A Related Workmentioning
confidence: 99%