Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures

  • Authors:
  • Yukio Itakura;Shigeo Tsujii

  • Affiliations:
  • Chuo University Research and Development Initiative, 1-13-27 Kasuga, Bunkyo-ku, 112-8551, Tokyo, Japan and Institute of Information Security, 2-14-1 Tsuruya-cho Kanagawa-ku, Yokohama, 221-0835, Ja ...;Chuo University Research and Development Initiative, 1-13-27 Kasuga, Bunkyo-ku, 112-8551, Tokyo, Japan and Institute of Information Security, 2-14-1 Tsuruya-cho Kanagawa-ku, Yokohama, 221-0835, Ja ...

  • Venue:
  • International Journal of Information Security - Special issue on SC 2003
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Conventional biometric authentication methods have a serious problem – it is easy to steal the biological information of another person, such as fingerprints, iris patterns, and facial forms. Accordingly, it is essential to protect authentication systems from an attack like impersonation with an artificial finger. To solve this problem, in this paper, we would like to propose a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures.This paper has two new aspects: one is to propose a method for embedding two kinds of data – personal biological information and a confidential item corresponding to a conventional secret key – into a cryptosystem key to detect any impersonation even if the biological information is stolen, and the other is to demonstrate the safety of the method, a factor which has never been referenced.From a privacy protection point of view, we believe that the multifactor biometric authentication method is of great significance. Moreover, it can economically establish certification authorities having the biological information. Meanwhile, in order to uniquely embed the biological information into the cryptosystem key, an algorithm is needed to uniquely select a representative template as described in this paper. In this paper, we propose only the concept of this algorithm and hope that concrete methodologies will be studied in the future.