An Authentication Protocol with Encrypted Biometric Data

  title={An Authentication Protocol with Encrypted Biometric Data},
  author={J. Bringer and H. Chabanne},
  • J. Bringer, H. Chabanne
  • Published in AFRICACRYPT 2008
  • Computer Science
  • At ACISP'07, Bringer et al. introduced a new protocol for achieving biometric authentication with a Private Information Retrieval (PIR) scheme. Their proposal is made to enforce the privacy of biometric data of users. We improve their work in several aspects. Firstly, we show how to replace the basic PIR scheme they used with Lipmaa's which has ones of the best known communication complexity. Secondly, we combine it with Secure Sketches to enable a strict separation between on one hand… CONTINUE READING
    70 Citations
    eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics
    • 35
    Comprehensive and Improved Secure Biometric System Using Homomorphic Encryption
    • 4
    Security of a Privacy-Preserving Biometric Authentication Protocol Revisited
    • 9
    • PDF
    Security Notions of Biometric Remote Authentication Revisited
    • 4
    • Highly Influenced
    A New Approach for Biometric Template Storage and Remote Authentication
    • 12
    • Highly Influenced
    • PDF
    Biometric cryptosystems: authentication, encryption and signature for biometric identities
    • 6
    • Highly Influenced
    Cryptographically secure biometrics
    • A. Stoianov
    • Computer Science, Engineering
    • Defense + Commercial Sensing
    • 2010
    • 32
    • Highly Influenced
    Privacy-preserving similarity evaluation and application to remote biometrics authentication
    • 31


    Extended Private Information Retrieval and Its Application in Biometrics Authentications
    • 51
    • PDF
    Secure Remote Authentication Using Biometric Data
    • 234
    • PDF
    An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
    • 130
    • PDF
    An Application of the Naccache-Stern Knapsack Cryptosystem to Biometric Authentication
    • 7
    New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates
    • 443
    • PDF
    Secure Biometric Authentication for Weak Computational Devices
    • 27
    • PDF
    Approximate Message Authentication and Biometric Entity Authentication
    • 29
    • PDF
    Practical Biometric Authentication with Template Protection
    • 345
    • PDF
    Combining Crypto with Biometrics Effectively
    • 560
    • PDF