Abstract
Many eligibility or entitlement certificates in every day life are non-transferable between persons. However, they are usually implemented by personal physical tokens that owners can easily pass around (e.g. credit card), driver’s license). So there must either be negligible incentives to pass these certificates or the tokens around, or the tokens must allow to authenticate the persons who show certificates, e.g., by imprinted photographs. However, any kind of easily accessible personal identifying information threatens the owners’ privacy. To solve these somehow paradoxical requirements, we assume for each owner a kind of pilot that is equipped with a tamper resistant biometric authentication facility. We draft cryptographic protocols for issuing and showing non-transferable yet privacy protecting certificates. Unforgeability of certificates relies on a well-established computational assumption, nontransferability relies upon a physical assumption and owners’ privacy is protected unconditionally.
The research for this paper was supported by the German Research Foundation under grant DFG-Bi 311/9-1.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Stefan Brands: An Efficient Off-line Electronic Cash System Based On The Representation Problem; Centrum voor Wiskunde en Informatica, Computer Science/ Departement of Algorithmics and Architecture, Technical Report CS-R9323, March 1993.
Stefan Brands: Untraceable Off-line Cash in Wallet with Observers; Crypto’ 93, LNCS 773, Springer-Verlag, Berlin 1994, 302–318.
Josef Bigün, Gérard Chollet, Gunilla Borgefors (eds.): Audio-and Video-based Biometric Person Authentication (AVBPA)’ 97, LNCS 1206, Springer-Verlag, Berlin 1997
Biometric fingerprint readers: BioMouse http://www.abio.com PC-Lockdown http://users.ids.net SecureTouch http://www.biometricaccess.com TouchSafe http://www.identix.com U.are.U http://www.digitalpersona.com Veriprint http://www.biometricID.com
Mihir Bellare, Phillip Rogaway: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols; 1st ACM Conference on Computer and Communications Security, ACM Press, New York 1993, 62–73.
David Chaum: Blind Signature System; Crypto’ 83, Plenum Press, New York 1984, 153.
David Chaum: A New Paradigm for Individuals in the Information Age; 1984 IEEE Symposium on Security and Privacy, IEEE Press, Washington 1984, 99–103.
David Chaum: Security without Identification: Transaction Systems to make Big Brother Obsolete; Communications of the ACM 28/10 (1985) 1030–1044.
David Chaum: Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms; Auscrypt’ 90, LNCS 453, Springer-Verlag, Berlin 1990, 246–264.
David Chaum: Achieving Electronic Privacy; Scientific American (August 1992) 96–101.
Lidong Chen: Witness Hiding Proofs and Applications; PhD Thesis DAIMI PB-477, Computer Science Department Aarhus University, August 1994.
David Chaum, Jan.-Hendrik Evertse, Jeroen van de Graaf: An improved protocol for demonstrating possession of discrete logarithms and some generalizations; Eurocrypt’ 87, LNCS 304, Springer-Verlag, Berlin 1988, 127–141.
David Chaum, Torben Pryds Pedersen: Wallet Databases with Observers. Crypto’ 92, LNCS 740, Springer Verlag, Berlin 1993, 89–105.
Uriel Feige, Adi Shamir: Witness Indistinguishable and Witness Hiding Protocols; 22nd Symposium on Theory of Computing (STOC) 1990, ACM Press, New York 1990, 416–426.
Benjamin Miller: Vital signs of identity; IEEE spectrum 31/2 (1994) 22–30.
Tatsuaki Okamoto, Kazuo Ohta: Divertible zero-knowledge interactive proofs and commutative random self-reducibility; Eurocrypt’ 89, LNCS 434, Sringer-Verlag, Berlin 1990, 134–149.
Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Trusting Mobile User Devices and Security Modules; Computer 30/2 (1997) 61–68.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bleumer, G. (1998). Biometric yet Privacy Protecting Person Authentication. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_8
Download citation
DOI: https://doi.org/10.1007/3-540-49380-8_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65386-8
Online ISBN: 978-3-540-49380-8
eBook Packages: Springer Book Archive