575 Hits in 5.6 sec

Dual Fingerprints Fusion for Cryptographic Key Generation

M. Marimuthu, A.Kannammal A.Kannammal
2015 International Journal of Computer Applications  
This paper presents a new cryptographic key generation algorithm from dual fingerprint biometric template; the suggested approach has simplified the generation of cryptographic keys and reduces the complexity  ...  Keys are generated from the fingerprint template for encrypting and decrypting the content of the user.  ...  Suppose if the attacker wants to derive the original message from the encrypted text, he/she needs the cryptographic key.  ... 
doi:10.5120/21865-5194 fatcat:o7hywwz7l5gwbaupkolxdwxpxe

Certificateless Digital Signature Technology for e-Governance Solutions

Shuchi Dhir, Dr. Sumithra Devi K.A
2019 Computer Science  
and disposal of Digital Signature Certificates (DSC).The solution, for the challenges understood from the case study, required implementation of a certificateless technology where private keys should be  ...  Although many solutions which provide certificateless technology exist, to date there have been no practical implementation for using biometrics for implementing the solution.  ...  We have used unique user identification numbers to derive a public key. The paired private key is derived from the unique features extracted from the biometric details of the individual.  ... 
doi:10.7494/csci.2019.20.4.3179 fatcat:ksahixdp2ba5tecxxitmtr3aby

Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience [chapter]

Yangguang Tian, Yingjiu Li, Rongmao Chen, Nan Li, Ximeng Liu, Bing Chang, Xingjie Yu
2018 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
We formalize several new security models, including leakage-resilient user authenticity and leakage-resilient biometrics privacy, for biometric-based remote user authentication, and prove the security  ...  Biometric-based remote user authentication is a useful primitive that allows an authorized user to authenticate to a remote server using his biometrics.  ...  [14] formally introduced the notion of secure sketches and fuzzy extractors, and use biometrics to derive a cryptographic key for various cryptographic applications, such as password-based authentication  ... 
doi:10.1007/978-3-030-01701-9_7 fatcat:c4pqjrv4hrdd5gwuzdzi7mvl7i

AGE: authentication in gadget-free healthcare environments

Tanesh Kumar, An Braeken, Anca Delia Jurcut, Madhusanka Liyanage, Mika Ylianttila
2019 Journal of Special Topics in Information Technology and Management  
Moreover, the proposed system showed better performance as compared with existing biometrics based remote user authentication schemes.  ...  This paper proposes an anonymous and privacy-preserving biometrics based authentication scheme for such gadget-free healthcare environment.  ...  We have compared results of our biometrics based user authentication directly with smart environments with existing remote biometric authentication schemes (e.g, biometrics based multiserver environments  ... 
doi:10.1007/s10799-019-00306-z fatcat:sl2dclm5z5dedc4vyayh3lxowy

A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation [chapter]

Thi Ai Thao Nguyen, Dinh Thanh Nguyen, Tran Khanh Dang
2015 Lecture Notes in Computer Science  
In this work, we have proposed a novel multi-factor biometric based remote authentication protocol.  ...  The notable feature of this work as compared to previous biometric based remote authentication protocols is its ability to defend insider attack.  ...  We also want to show a great appreciation to each member of D-STAR Lab ( for their enthusiastic supports and helpful advices during the time we have carried out this research.  ... 
doi:10.1007/978-3-319-24315-3_8 fatcat:qkm2pys5sjdh3jylggdvo4so7y

Emerging cryptographic challenges in image and video processing

W. Puech, Z. Erkin, M. Barni, S. Rane, R. L. Lagendijk
2012 2012 19th IEEE International Conference on Image Processing  
, secure face recognition, and secure biometrics.  ...  , secure face recognition, and secure biometrics.  ...  These applications range from multimedia content production and distribution to advanced biometric signal processing for access control, identity verification and authentication.  ... 
doi:10.1109/icip.2012.6467438 dblp:conf/icip/PuechEBRL12 fatcat:27p4a5d5vbgvvabwgabkgppqem

SoK: Cryptographic Confidentiality of Data on Mobile Devices

Maximilian Zinkus, Tushar M. Jois, Matthew Green
2021 Proceedings on Privacy Enhancing Technologies  
Our work proposes a methodology that researchers can use to analyze cryptographic data confidentiality for mobile devices.  ...  We then analyze existing mobile device confidentiality measures to identify research areas that have not received proper attention from the community and represent opportunities for future research.  ...  Harlan Yu of Upturn, for their insightful feedback.  ... 
doi:10.2478/popets-2022-0029 fatcat:uykbhajxxveatal5jopghi2jji

Biometrics-Based RSA Cryptosystem for Securing Real-Time Communication

Xiaolong Liu, Wei-Bin Lee, Quy-Anh Bui, Chia-Chen Lin, Hsiao-Ling Wu
2018 Sustainability  
Since the key is derived from the user's biometrics, it is strongly user-dependent and works well to convince others of the authenticity of the owner.  ...  The idea put forward is to generate a cryptographic public key based on a user's biometric information without using Public Key Infrastructure (PKI) and establish a secured channel in a public network.  ...  Accordingly, the basic idea of this paper is to generate a cryptographic public key from a user's biometrics, especially for RSA-one of the most widely used cryptosystems in the world today.  ... 
doi:10.3390/su10103588 fatcat:opx6vrqmeza2bgs5tsofqe7d7e

Biometrics as a Cryptographic Method for Network Security

Kumar Ankit, Jayaram Rekha
2016 Indian Journal of Science and Technology  
Hence billons of unique keys can be created, making it very hard for an attacker to guess the key.  ...  The proposed biometrics-based Encryption/Decryption Scheme uses fingerprints to generate a unique key.  ...  The remote usage of the biometric data requires it to be transmitted over an unsecured channel (such as the internet), hence there is a need to generate revocable cryptographic key from the biometrics  ... 
doi:10.17485/ijst/2016/v9i22/95288 fatcat:fzz3zibs4nc6hgvcejplyteaji

ePassport and eID Technologies [chapter]

Lucjan Hanzlik, Mirosław Kutyłowski
2021 Security of Ubiquitous Computing Systems  
Thereby we aim to shed light on the development of ubiquitous systems, where many artifacts will require strong electronic identification with similar properties to those in the case of eIDs issued for  ...  Option 2: Remote Use In this case an eID serves as a secure cryptographic token for remote authentication.  ...  message authentication tags T R , T C based on a key derived from K. : r e d a e r : D I e password p, parameters G password p, parameters G There are two variants of the mapping function specified in  ... 
doi:10.1007/978-3-030-10591-4_5 fatcat:v3miqnqj4vhsneltru32b4wkte

A Survey of System Security in Contactless Electronic Passports [article]

Anshuman Sinha
2010 arXiv   pre-print
It analyzes and describes the cryptographic protocols used in Basic Access Control (BAC) and Extended Access Control (EAC).  ...  The encoded data includes the holder's name, date of birth, and other identifying information for the holder or the document.  ...  The ICAO specifications for passive authentication have provisions for using larger key lengths which improve cryptographic security.  ... 
arXiv:1011.2946v1 fatcat:a632gnz5ejbmxapgnwkcmcp6x4

A Secure and Efficient Multi-Factor Mutual Certificateless Authentication with Key Agreement Protocol for Mobile Client-Server Environment on ECC without the third-party

Liling Cao, Wancheng Ge
2016 International Journal of Security and Its Applications  
Authentication with key agreement (AKA) protocols are implemented to provide identity authentication and session keys for communication entities.  ...  from a secret key of the user, while partial private key of the user is issued by KGC.  ...  Efficiency Analysis The time cost and the lengths of parameters for referred cryptographic operations are listed in Table 5 .  ... 
doi:10.14257/ijsia.2016.10.10.20 fatcat:4ouqcztglngtbcniwpapvnsufq

Privacy preserving multi-factor authentication with biometrics

Abhilasham Bhargav-Spantzel, Anna Squicciarini, Elisa Bertino
2006 Proceedings of the second ACM workshop on Digital identity management - DIM '06  
The first phase consists of a two-factor biometric authentication based on zero knowledge proofs. We employ techniques from vector-space model to generate cryptographic biometric keys.  ...  These keys are kept secret, thus preserving the confidentiality of the biometric data, and at the same time exploit the advantages of a biometric authentication.  ...  Biometric authentication from a remote location also represents a difficult issue because of the risk of spoofing attacks.  ... 
doi:10.1145/1179529.1179540 dblp:conf/dim/Bhargav-SpantzelSB06 fatcat:sery7rcinjeohnyrwwdkxjqqlq

A crypto-biometric scheme based on iris-templates with fuzzy extractors

R. Álvarez Mariño, F. Hernández Álvarez, L. Hernández Encinas
2012 Information Sciences  
key by using her own biometric template.  ...  Moreover, Biometrics offers a good option to assist Cryptography for confidentiality, encryption, and decryption of messages by using some biometric traits.  ...  Acknowledgement Authors would like to thank the anonymous reviewers for their helpful comments and professor R. Durán for his valuable suggestions.  ... 
doi:10.1016/j.ins.2012.01.042 fatcat:5mp3uyrcv5fexdcci3a2jyowem

Secure speech biometric templates for user authentication

K. Inthavisas, D. Lopresti
2012 IET Biometrics  
to derive the cryptographic key.  ...  During the matching process, the helper data and the biometrics are used to derive a cryptographic key.  ... 
doi:10.1049/iet-bmt.2011.0008 fatcat:jfcwognuazaa7nfwq6hisjayj4
« Previous Showing results 1 — 15 out of 575 results