Corpus ID: 13989464

Analysis of Biometric Authentication Protocols in the Blackbox Model

  title={Analysis of Biometric Authentication Protocols in the Blackbox Model},
  author={K. Simoens and J. Bringer and H. Chabanne and S. Seys},
  • K. Simoens, J. Bringer, +1 author S. Seys
  • Published 2011
  • Computer Science
  • ArXiv
  • In this paper we analyze different biometric authentication protocols considering an internal adversary. Our contribution takes place at two levels. On the one hand, we introduce a new comprehensive framework that encompasses the various schemes we want to look at. On the other hand, we exhibit actual attacks on recent schemes such as those introduced at ACISP 2007, ACISP 2008, and SPIE 2010, and some others. We follow a blackbox approach in which we consider components that perform operations… CONTINUE READING
    3 Citations

    Figures, Tables, and Topics from this paper

    Explore Further: Topics Discussed in This Paper


    Blackbox Security of Biometrics (Invited Paper)
    • J. Bringer, H. Chabanne, K. Simoens
    • Computer Science
    • 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
    • 2010
    • 5
    • PDF
    An Authentication Protocol with Encrypted Biometric Data
    • 69
    Enhancing security and privacy in biometrics-based authentication systems
    • 1,524
    • PDF
    A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes
    • 36
    • PDF
    Cryptographically secure biometrics
    • A. Stoianov
    • Computer Science, Engineering
    • Defense + Commercial Sensing
    • 2010
    • 32
    Cancelable Biometrics: A Case Study in Fingerprints
    • 179