Extracting randomness: a survey and new constructions
Journal of Computer and System Sciences
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications
ISC '02 Proceedings of the 5th International Conference on Information Security
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Anonymous credentials with biometrically-enforced non-transferability
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Reusable cryptographic fuzzy extractors
Proceedings of the 11th ACM conference on Computer and communications security
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 04
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
SIAM Journal on Computing
Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table
ICANNGA '07 Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II
The practical subtleties of biometric key generation
SS'08 Proceedings of the 17th conference on Security symposium
Privacy Weaknesses in Biometric Sketches
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
An improved protocol for demonstrating possession of discrete logarithms and some generalizations
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Proving in zero-knowledge that a number is the product of two safe primes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Efficient proofs that a committed number lies in an interval
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
An efficient biocryptosystem based on the iris biometrics
PSIVT'07 Proceedings of the 2nd Pacific Rim conference on Advances in image and video technology
A verifiable random function with short proofs and keys
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Secure remote authentication using biometric data
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Fingerprint-Based Fuzzy Vault: Implementation and Performance
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Circuits and Systems for Video Technology
Fuzzy extractors for minutiae-based fingerprint authentication
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric key binding: fuzzy vault based on iris images
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
A Proposal for a Privacy-preserving National Identity Card
Transactions on Data Privacy
The challenges raised by the privacy-preserving identity card
Cryptography and Security
Hi-index | 0.00 |
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonymously authenticate, can be severely limited if their use requires possession of the credential owner's biometric. We target to provide strong security guarantees using minimal trust assumptions, namely that a fresh reading of a biometric is enforced on each use of the credentials. Furthermore, no biometric or other information is compromised if an adversary obtains full access to all credential-related data. Our solution relies on constructions for fuzzy extractors that allow one to extract and reproduce a random string from noisy biometric images. We first examine security requirements of biometric key generators, and then show how they can be integrated with anonymous credentials to achieve a high degree of non-transferability and security.