Security and Privacy Issues in E-passports
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Securing Fingerprint Template: Fuzzy Vault with Helper Data
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
An improved BioHashing for human authentication
Pattern Recognition
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
Pattern Recognition
ePassport: Securing International Contacts with Contactless Chips
Financial Cryptography and Data Security
Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key Agreement Protocol
IAS '08 Proceedings of the 2008 The Fourth International Conference on Information Assurance and Security
Palm Vein Verification System Based on SIFT Matching
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Keystroke dynamics with low constraints SVM based passphrase enrollment
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
An on-line secure e-passport protocol
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
A traceability attack against e-passports
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Hi-index | 0.00 |
We address in this paper the problem of privacy in the current architecture in electronic passports for the storage and transmission of biometric data such as fingerprints. The current architecture provides a good protection of biometric personal data but brute force attack could be used in the near future using cloud computing. We propose a new solution combining cryptographic protocols and cancellable biometrics to solve this problem. The biocode of an individual is protected by cryptographic keys exchanged by the PACE protocol. We put into obviousness the benefit of the proposed solution in terms of security and privacy.