An Authentication Protocol with Encrypted Biometric Data
@inproceedings{Bringer2008AnAP, title={An Authentication Protocol with Encrypted Biometric Data}, author={J. Bringer and H. Chabanne}, booktitle={AFRICACRYPT}, year={2008} }
At ACISP'07, Bringer et al. introduced a new protocol for achieving biometric authentication with a Private Information Retrieval (PIR) scheme. Their proposal is made to enforce the privacy of biometric data of users. We improve their work in several aspects. Firstly, we show how to replace the basic PIR scheme they used with Lipmaa's which has ones of the best known communication complexity. Secondly, we combine it with Secure Sketches to enable a strict separation between on one hand… CONTINUE READING
Supplemental Presentations
Topics from this paper
70 Citations
Improving the accuracy and storage cost in biometric remote authentication schemes
- Computer Science
- J. Netw. Comput. Appl.
- 2010
- 19
eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics
- Computer Science
- MM&Sec '10
- 2010
- 35
Comprehensive and Improved Secure Biometric System Using Homomorphic Encryption
- Computer Science
- DPM/QASA@ESORICS
- 2015
- 4
Security of a Privacy-Preserving Biometric Authentication Protocol Revisited
- Computer Science
- CANS
- 2014
- 9
- PDF
Security Notions of Biometric Remote Authentication Revisited
- Computer Science
- STM
- 2011
- 4
- Highly Influenced
A New Approach for Biometric Template Storage and Remote Authentication
- Computer Science
- ICB
- 2009
- 12
- Highly Influenced
- PDF
Biometric cryptosystems: authentication, encryption and signature for biometric identities
- Computer Science
- 2011
- 6
- Highly Influenced
Cryptographically secure biometrics
- Computer Science, Engineering
- Defense + Commercial Sensing
- 2010
- 32
- Highly Influenced
Privacy-preserving similarity evaluation and application to remote biometrics authentication
- Mathematics, Computer Science
- Soft Comput.
- 2010
- 31
References
SHOWING 1-10 OF 47 REFERENCES
Extended Private Information Retrieval and Its Application in Biometrics Authentications
- Computer Science
- CANS
- 2007
- 51
- PDF
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
- Computer Science
- ACISP
- 2007
- 130
- PDF
An Application of the Naccache-Stern Knapsack Cryptosystem to Biometric Authentication
- Computer Science
- 2007 IEEE Workshop on Automatic Identification Advanced Technologies
- 2007
- 7
New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates
- Computer Science
- AVBPA
- 2003
- 443
- PDF
Secure Biometric Authentication for Weak Computational Devices
- Computer Science
- Financial Cryptography
- 2005
- 27
- PDF
Approximate Message Authentication and Biometric Entity Authentication
- Computer Science
- Financial Cryptography
- 2005
- 29
- PDF
The best of both worlds: Applying secure sketches to cancelable biometrics
- Computer Science
- Sci. Comput. Program.
- 2008
- 79
Combining Crypto with Biometrics Effectively
- Computer Science
- IEEE Transactions on Computers
- 2006
- 560
- PDF