Analysis of Biometric Authentication Protocols in the Blackbox Model
@article{Simoens2011AnalysisOB, title={Analysis of Biometric Authentication Protocols in the Blackbox Model}, author={K. Simoens and J. Bringer and H. Chabanne and S. Seys}, journal={ArXiv}, year={2011}, volume={abs/1101.2569} }
In this paper we analyze different biometric authentication protocols considering an internal adversary. Our contribution takes place at two levels. On the one hand, we introduce a new comprehensive framework that encompasses the various schemes we want to look at. On the other hand, we exhibit actual attacks on recent schemes such as those introduced at ACISP 2007, ACISP 2008, and SPIE 2010, and some others. We follow a blackbox approach in which we consider components that perform operations… CONTINUE READING
3 Citations
Biometric cryptosystems: authentication, encryption and signature for biometric identities
- Computer Science
- 2011
- 6
- Highly Influenced
References
SHOWING 1-10 OF 38 REFERENCES
Blackbox Security of Biometrics (Invited Paper)
- Computer Science
- 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
- 2010
- 5
- PDF
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
- Computer Science
- ACISP
- 2007
- 129
- PDF
Enhancing security and privacy in biometrics-based authentication systems
- Engineering, Computer Science
- IBM Syst. J.
- 2001
- 1,524
- PDF
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes
- Computer Science
- ISPEC
- 2008
- 36
- PDF
New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates
- Computer Science
- AVBPA
- 2003
- 442
- PDF
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
- Computer Science
- ACNS
- 2003
- 17
- PDF
Cancelable Biometrics: A Case Study in Fingerprints
- Computer Science
- 18th International Conference on Pattern Recognition (ICPR'06)
- 2006
- 179