High-Radix Montgomery Modular Exponentiation on Reconfigurable Hardware
IEEE Transactions on Computers
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Support Vector Machines for Pattern Classification (Advances in Pattern Recognition)
Support Vector Machines for Pattern Classification (Advances in Pattern Recognition)
Designs, Codes and Cryptography
An analysis of BioHashing and its variants
Pattern Recognition
Remarks on BioHash and its mathematical foundation
Information Processing Letters
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
A survey of homomorphic encryption for nonspecialists
EURASIP Journal on Information Security
EURASIP Journal on Advances in Signal Processing
An introduction to biometric recognition
IEEE Transactions on Circuits and Systems for Video Technology
eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics
Proceedings of the 12th ACM workshop on Multimedia and security
Hi-index | 0.00 |
Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biometrics might reveal more information than the identity itself, as well as provide the ability to track users over an extended period of time. In this paper, we propose an authentication protocol that alleviates these concerns. The protocol takes care of user privacy, template protection and trust issues in biometric authentication systems. The protocol uses asymmetric encryption, and captures the advantages of biometric authentication. The protocol provides non-repudiable identity verification, while not revealing any additional information about the user to the server or vice versa. We show that the protocol is secure under various attacks. Experimental results indicate that the overall method is efficient to be used in practical scenarios.