Abstract
We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summarised as follows: (1) potential for much better accuracy using different types of biometric signals, including behavioural ones; and (2) improved user privacy, since user identities are not transmitted at any point in the protocol execution. The new protocol takes advantage of state-of-the-art identification classifiers, which provide not only better accuracy, but also the possibility to perform authentication without knowing who the user claims to be. Cryptographic security is based on the Paillier public key encryption scheme.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Bringer, J., Chabanne, H., Izabachène, M., Pointcheval, D., Tang, Q., Zimmer, S.: An application of the goldwasser-micali cryptosystem to biometric authentication. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 96–106. Springer, Heidelberg (2007)
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Cryptology ePrint Archive, Report 2003/235 (2003), http://eprint.iacr.org/
Boyen, X.: Reusable cryptographic fuzzy extractors. In: CCS 2004: Proceedings of the 11th ACM conference on Computer and communications security, pp. 82–91. ACM, New York (2004)
Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometric data. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147–163. Springer, Heidelberg (2005), http://www.cs.stanford.edu/~xb/eurocrypt05b/
Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: CCS 1999: Proceedings of the 6th ACM conference on Computer and communications security, pp. 73–82. ACM, New York (1999)
Hocquet, S., Ramel, J.Y., Cardot, H.: Fusion of methods for keystroke dynamic authentication. Automatic Identification Advanced Technologies, 2005. In: Fourth IEEE Workshop, October 17–18, 2005, pp. 224–229 (2005)
Monrose, F., Reiter, M., Li, Q., Wetzel, S.: Cryptographic key generation from voice. In: Proceedings of IEEE Symposium on Security and Privacy, S&P 2001, pp. 202–213 (2001)
Yegnanarayana, B., Prasanna, S., Zachariah, J., Gupta, C.: Combining evidence from source, suprasegmental and spectral features for a fixed-text speaker verification system. IEEE Transactions on Speech and Audio Processing 13, 575–582 (2005)
Cauchie, S., Brouard, T., Cardot, H.: From features extraction to strong security in mobile environment: A new hybrid system. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 489–498. Springer, Heidelberg (2006)
Feng, H., Choong, W.C.: Private key generation from on-line handwritten signatures. Inf. Manag. Comput. Security 10(4), 159–164 (2002)
Fuentes, M., Garcia-Salicetti, S., Dorizzi, B.: On-line signature verification: Fusion of a hidden markov model and a neural network via a support vector machine. iwfhr 00, 253 (2002)
Goh, A., Ling, D.N.C.: Computation of cryptographic keys from face biometrics. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 1–13. Springer, Heidelberg (2003)
Yan, T.T.H.: Object recognition using fractal neighbor distance: eventual convergence and recognition rates. In: Proceedings of 15th International Conference on Pattern Recognition, vol. 2, pp. 781–784 (2000)
Uludag, U.A.J.: Securing fingerprint template: Fuzzy vault with helper data. In: Conference on Computer Vision and Pattern Recognition Workshop, June 17-22, 2006, pp. 163–163 (2006)
Guo, H.: A hidden markov model fingerprint matching approach. In: Proceedings of 2005 International Conference on Machine Learning and Cybernetics, August 18-21, 2005, vol. 8, pp. 5055–5059 (2005)
Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Transactions on Computers 55(9), 1081–1088 (2006)
Crammer, K., Singer, Y.: On the algorithmic implementation of multiclass kernel-based vector machines. Journal of Machine Learning Research 2, 265–292 (2001)
Barbosa, M., Brouard, T., Cauchie, S., Sousa, S.: Secure biometric authentication with improved accuracy. Cryptology ePrint Archive (2008)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Paillier, P., Pointcheval, D.: Efficient public-key cryptosystems provably secure against active adversaries. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 165–179. Springer, Heidelberg (1999)
Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: Security proofs and improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259–274. Springer, Heidelberg (2000)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Barbosa, M., Brouard, T., Cauchie, S., de Sousa, S.M. (2008). Secure Biometric Authentication with Improved Accuracy. In: Mu, Y., Susilo, W., Seberry, J. (eds) Information Security and Privacy. ACISP 2008. Lecture Notes in Computer Science, vol 5107. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70500-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-70500-0_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69971-2
Online ISBN: 978-3-540-70500-0
eBook Packages: Computer ScienceComputer Science (R0)