A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Dual Fingerprints Fusion for Cryptographic Key Generation
2015
International Journal of Computer Applications
This paper presents a new cryptographic key generation algorithm from dual fingerprint biometric template; the suggested approach has simplified the generation of cryptographic keys and reduces the complexity ...
Keys are generated from the fingerprint template for encrypting and decrypting the content of the user. ...
Suppose if the attacker wants to derive the original message from the encrypted text, he/she needs the cryptographic key. ...
doi:10.5120/21865-5194
fatcat:o7hywwz7l5gwbaupkolxdwxpxe
Certificateless Digital Signature Technology for e-Governance Solutions
2019
Computer Science
and disposal of Digital Signature Certificates (DSC).The solution, for the challenges understood from the case study, required implementation of a certificateless technology where private keys should be ...
Although many solutions which provide certificateless technology exist, to date there have been no practical implementation for using biometrics for implementing the solution. ...
We have used unique user identification numbers to derive a public key. The paired private key is derived from the unique features extracted from the biometric details of the individual. ...
doi:10.7494/csci.2019.20.4.3179
fatcat:ksahixdp2ba5tecxxitmtr3aby
Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience
[chapter]
2018
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
We formalize several new security models, including leakage-resilient user authenticity and leakage-resilient biometrics privacy, for biometric-based remote user authentication, and prove the security ...
Biometric-based remote user authentication is a useful primitive that allows an authorized user to authenticate to a remote server using his biometrics. ...
[14] formally introduced the notion of secure sketches and fuzzy extractors, and use biometrics to derive a cryptographic key for various cryptographic applications, such as password-based authentication ...
doi:10.1007/978-3-030-01701-9_7
fatcat:c4pqjrv4hrdd5gwuzdzi7mvl7i
AGE: authentication in gadget-free healthcare environments
2019
Journal of Special Topics in Information Technology and Management
Moreover, the proposed system showed better performance as compared with existing biometrics based remote user authentication schemes. ...
This paper proposes an anonymous and privacy-preserving biometrics based authentication scheme for such gadget-free healthcare environment. ...
We have compared results of our biometrics based user authentication directly with smart environments with existing remote biometric authentication schemes (e.g, biometrics based multiserver environments ...
doi:10.1007/s10799-019-00306-z
fatcat:sl2dclm5z5dedc4vyayh3lxowy
A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation
[chapter]
2015
Lecture Notes in Computer Science
In this work, we have proposed a novel multi-factor biometric based remote authentication protocol. ...
The notable feature of this work as compared to previous biometric based remote authentication protocols is its ability to defend insider attack. ...
We also want to show a great appreciation to each member of D-STAR Lab (www.dstar.edu.vn) for their enthusiastic supports and helpful advices during the time we have carried out this research. ...
doi:10.1007/978-3-319-24315-3_8
fatcat:qkm2pys5sjdh3jylggdvo4so7y
Emerging cryptographic challenges in image and video processing
2012
2012 19th IEEE International Conference on Image Processing
, secure face recognition, and secure biometrics. ...
, secure face recognition, and secure biometrics. ...
These applications range from multimedia content production and distribution to advanced biometric signal processing for access control, identity verification and authentication. ...
doi:10.1109/icip.2012.6467438
dblp:conf/icip/PuechEBRL12
fatcat:27p4a5d5vbgvvabwgabkgppqem
SoK: Cryptographic Confidentiality of Data on Mobile Devices
2021
Proceedings on Privacy Enhancing Technologies
Our work proposes a methodology that researchers can use to analyze cryptographic data confidentiality for mobile devices. ...
We then analyze existing mobile device confidentiality measures to identify research areas that have not received proper attention from the community and represent opportunities for future research. ...
Harlan Yu of Upturn, for their insightful feedback. ...
doi:10.2478/popets-2022-0029
fatcat:uykbhajxxveatal5jopghi2jji
Biometrics-Based RSA Cryptosystem for Securing Real-Time Communication
2018
Sustainability
Since the key is derived from the user's biometrics, it is strongly user-dependent and works well to convince others of the authenticity of the owner. ...
The idea put forward is to generate a cryptographic public key based on a user's biometric information without using Public Key Infrastructure (PKI) and establish a secured channel in a public network. ...
Accordingly, the basic idea of this paper is to generate a cryptographic public key from a user's biometrics, especially for RSA-one of the most widely used cryptosystems in the world today. ...
doi:10.3390/su10103588
fatcat:opx6vrqmeza2bgs5tsofqe7d7e
Biometrics as a Cryptographic Method for Network Security
2016
Indian Journal of Science and Technology
Hence billons of unique keys can be created, making it very hard for an attacker to guess the key. ...
The proposed biometrics-based Encryption/Decryption Scheme uses fingerprints to generate a unique key. ...
The remote usage of the biometric data requires it to be transmitted over an unsecured channel (such as the internet), hence there is a need to generate revocable cryptographic key from the biometrics ...
doi:10.17485/ijst/2016/v9i22/95288
fatcat:fzz3zibs4nc6hgvcejplyteaji
ePassport and eID Technologies
[chapter]
2021
Security of Ubiquitous Computing Systems
Thereby we aim to shed light on the development of ubiquitous systems, where many artifacts will require strong electronic identification with similar properties to those in the case of eIDs issued for ...
Option 2: Remote Use In this case an eID serves as a secure cryptographic token for remote authentication. ...
message authentication tags T R , T C based on a key derived from K. : r e d a e r : D I e password p, parameters G password p, parameters G There are two variants of the mapping function specified in ...
doi:10.1007/978-3-030-10591-4_5
fatcat:v3miqnqj4vhsneltru32b4wkte
A Survey of System Security in Contactless Electronic Passports
[article]
2010
arXiv
pre-print
It analyzes and describes the cryptographic protocols used in Basic Access Control (BAC) and Extended Access Control (EAC). ...
The encoded data includes the holder's name, date of birth, and other identifying information for the holder or the document. ...
The ICAO specifications for passive authentication have provisions for using larger key lengths which improve cryptographic security. ...
arXiv:1011.2946v1
fatcat:a632gnz5ejbmxapgnwkcmcp6x4
A Secure and Efficient Multi-Factor Mutual Certificateless Authentication with Key Agreement Protocol for Mobile Client-Server Environment on ECC without the third-party
2016
International Journal of Security and Its Applications
Authentication with key agreement (AKA) protocols are implemented to provide identity authentication and session keys for communication entities. ...
from a secret key of the user, while partial private key of the user is issued by KGC. ...
Efficiency Analysis The time cost and the lengths of parameters for referred cryptographic operations are listed in Table 5 . ...
doi:10.14257/ijsia.2016.10.10.20
fatcat:4ouqcztglngtbcniwpapvnsufq
Privacy preserving multi-factor authentication with biometrics
2006
Proceedings of the second ACM workshop on Digital identity management - DIM '06
The first phase consists of a two-factor biometric authentication based on zero knowledge proofs. We employ techniques from vector-space model to generate cryptographic biometric keys. ...
These keys are kept secret, thus preserving the confidentiality of the biometric data, and at the same time exploit the advantages of a biometric authentication. ...
Biometric authentication from a remote location also represents a difficult issue because of the risk of spoofing attacks. ...
doi:10.1145/1179529.1179540
dblp:conf/dim/Bhargav-SpantzelSB06
fatcat:sery7rcinjeohnyrwwdkxjqqlq
A crypto-biometric scheme based on iris-templates with fuzzy extractors
2012
Information Sciences
key by using her own biometric template. ...
Moreover, Biometrics offers a good option to assist Cryptography for confidentiality, encryption, and decryption of messages by using some biometric traits. ...
Acknowledgement Authors would like to thank the anonymous reviewers for their helpful comments and professor R. Durán for his valuable suggestions. ...
doi:10.1016/j.ins.2012.01.042
fatcat:5mp3uyrcv5fexdcci3a2jyowem
Secure speech biometric templates for user authentication
2012
IET Biometrics
to derive the cryptographic key. ...
During the matching process, the helper data and the biometrics are used to derive a cryptographic key. ...
doi:10.1049/iet-bmt.2011.0008
fatcat:jfcwognuazaa7nfwq6hisjayj4
« Previous
Showing results 1 — 15 out of 575 results