Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries
ASIACRYPT '99 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
IWFHR '02 Proceedings of the Eighth International Workshop on Frontiers in Handwriting Recognition (IWFHR'02)
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
On the algorithmic implementation of multiclass kernel-based vector machines
The Journal of Machine Learning Research
Reusable cryptographic fuzzy extractors
Proceedings of the 11th ACM conference on Computer and communications security
Fusion of Methods for Keystroke Dynamic Authentication
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
Securing Fingerprint Template: Fuzzy Vault with Helper Data
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Public-key encryption in a multi-user setting: security proofs and improvements
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
An application of the Goldwasser-Micali cryptosystem to biometric authentication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
From features extraction to strong security in mobile environment: a new hybrid system
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Secure remote authentication using biometric data
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
A New Approach for Biometric Template Storage and Remote Authentication
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics
Proceedings of the 12th ACM workshop on Multimedia and security
Secure and efficient protocols for iris and fingerprint identification
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Security notions of biometric remote authentication revisited
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Hi-index | 0.00 |
We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summarised as follows: (1) potential for much better accuracy using different types of biometric signals, including behavioural ones; and (2) improved user privacy, since user identities are not transmitted at any point in the protocol execution. The new protocol takes advantage of state-of-the-art identification classifiers, which provide not only better accuracy, but also the possibility to perform authentication without knowing who the user claims to be. Cryptographic security is based on the Paillier public key encryption scheme.