Information Security Practice and Experience
DOI: 10.1007/978-3-540-79104-1_1
|View full text |Cite
|
Sign up to set email alerts
|

Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol

Abstract: Abstract. In this paper, we clarify and verify an established biometric authentication protocol. The selected protocol is intended to have three properties: effectiveness (integrity checks are carried out on all hardware before enabling transmission of biometric data), correctness (the user is satisfied that integrity checks have been executed correctly before transmission of biometric data occurs), and secrecy (unauthorized users cannot obtain biometric data by intercepting messages between the system's hardw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…Also, DB could function as a trusted storage for different SP's. Since SC captures the biometric data and performs the feature extraction, a biometric smartcard readers could be used as in Atallah et al (2005) or SC could be installed as a Trusted Biometric Reader (Salaiwarakul and Ryan, 2008) where the smart card of the user for multi-factor authentication schemes verifies the correctness of integrity checking of the TBR. This way, leakage of the biometric data through CS is prevented.…”
Section: Distributed Systems With Detached Biometric Storagementioning
confidence: 99%
“…Also, DB could function as a trusted storage for different SP's. Since SC captures the biometric data and performs the feature extraction, a biometric smartcard readers could be used as in Atallah et al (2005) or SC could be installed as a Trusted Biometric Reader (Salaiwarakul and Ryan, 2008) where the smart card of the user for multi-factor authentication schemes verifies the correctness of integrity checking of the TBR. This way, leakage of the biometric data through CS is prevented.…”
Section: Distributed Systems With Detached Biometric Storagementioning
confidence: 99%
“…Since SC captures the biometric data and performs the feature extraction, this component could be installed as a Trusted Biometric Reader as in [19]. Alternatively, a special smartcard biometric reader [7] could be used to capture biometrics and perform the necessary computations for session key generation and AES, which would provide the highest security for the user since no transfer of biometric data will take place between the user's smart card and SC.…”
Section: Motivation and Contributionsmentioning
confidence: 99%
“…user's fingerprint is captured and made as a rubber finger that can be used in the authentication process [1]. This protocol is proposed to solve the problem of the biometric data [2,3] when is used in the authentication process.…”
Section: Introductionmentioning
confidence: 99%