An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication

@inproceedings{Bringer2007AnAO,
  title={An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication},
  author={J. Bringer and H. Chabanne and Malika Izabach{\`e}ne and D. Pointcheval and Qiang Tang and S. Zimmer},
  booktitle={ACISP},
  year={2007}
}
  • J. Bringer, H. Chabanne, +3 authors S. Zimmer
  • Published in ACISP 2007
  • Computer Science
  • This work deals with the security challenges in authentication protocols employing volatile biometric features, where the authentication is indeed a comparison between a fresh biometric template and that enrolled during the enrollment phase. We propose a security model for biometric-based authentication protocols by assuming that the biometric features to be public. Extra attention is paid to the privacy issues related to the sensitive relationship between a biometric feature and the relevant… CONTINUE READING
    130 Citations

    Figures and Topics from this paper

    Explore Further: Topics Discussed in This Paper

    Security of a Privacy-Preserving Biometric Authentication Protocol Revisited
    • 9
    • Highly Influenced
    • PDF
    Secure Biometric Authentication with Improved Accuracy
    • 37
    • Highly Influenced
    • PDF
    Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks
    • 5
    • Highly Influenced
    A Privacy-preserving Biometric Authentication Protocol Revisited
    • 1
    • PDF
    An Authentication Protocol with Encrypted Biometric Data
    • 69
    Biometric cryptosystems: authentication, encryption and signature for biometric identities
    • 6
    Multi-biometrics based crypto-biometric session key generation and sharing protocol
    • 9
    A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes
    • 36
    • PDF

    References

    SHOWING 1-10 OF 17 REFERENCES
    Secure Biometric Authentication for Weak Computational Devices
    • 27
    • PDF
    A fuzzy commitment scheme
    • 1,481
    • PDF
    Robust, short and sensitive authentication tags using secure sketch
    • 47
    • PDF
    Fuzzy Identity-Based Encryption
    • 3,638
    • PDF
    Efficient Binary Conversion for Paillier Encrypted Values
    • 128
    • PDF