2019
DOI: 10.1109/mcomstd.001.1900033
|View full text |Cite
|
Sign up to set email alerts
|

Using Biometrics to Fight Credential Fraud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…We derive several promising avenues for future research from the discussion and limitations of our work. First of all, researchers should explore technical limitations, such as a strong binding of VC to users when a high level of assurance is required, e. g, through link secrets, biometrics, secure hardware, but also flexible enough to allow for easy usage in settings where only a low level of assurance is sufficient [79]. Further, support for certificate hierarchies is important for key management in large ecosystems, and a discussion of advantages and disadvantages of blockchain-and CA-based public key infrastructures (PKIs), as well as decentralized or centralized double-spending protection, could be started based on first successful implementations.…”
Section: Discussionmentioning
confidence: 99%
“…We derive several promising avenues for future research from the discussion and limitations of our work. First of all, researchers should explore technical limitations, such as a strong binding of VC to users when a high level of assurance is required, e. g, through link secrets, biometrics, secure hardware, but also flexible enough to allow for easy usage in settings where only a low level of assurance is sufficient [79]. Further, support for certificate hierarchies is important for key management in large ecosystems, and a discussion of advantages and disadvantages of blockchain-and CA-based public key infrastructures (PKIs), as well as decentralized or centralized double-spending protection, could be started based on first successful implementations.…”
Section: Discussionmentioning
confidence: 99%
“…As of the writing of this paper, there are two proofs of concept for credential delegation. One of them is a set of conventions that permit data in a VC to be traced back to its source while retaining its verifiable quality [62]. The other one is mathematical proof that the credential chaining can be done using the SSI credentials implemented in the Hyperledger Indy technology stack [63].…”
Section: ) Credential Delegationmentioning
confidence: 99%
“…For mother and baby pairs, authentication would be necessary to show that both the mother and the baby being presented match personal identifiers in their credentials. An architecture can be designed to include a biometric identifier within a credential, and used to authenticate the presenter of the credential (Hardman et al, 2019). This could be developed in a decentralized manner, without requiring a national or centralized biometric service, with the biometric template being used solely to verify the presenter of the credential.…”
Section: Identity Verification and Authenticationmentioning
confidence: 99%