Secure Biometric Authentication for Weak Computational Devices

  title={Secure Biometric Authentication for Weak Computational Devices},
  author={Mikhail J. Atallah and Keith B. Frikken and Michael T. Goodrich and Roberto Tamassia},
  booktitle={Financial Cryptography},
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can later be used to impersonate the user (or reveal personal biometric information). Unlike some previous computationally expensive schemes — which make use of slower cryptographic primitives — this paper presents methods that are particularly suited to financial institutions that authenticate users with biometric… CONTINUE READING
Highly Cited
This paper has 26 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 13 extracted citations


Publications referenced by this paper.
Showing 1-10 of 21 references

More . Anonymous credentials with biometricallyenforced nontransferability

  • L. Hong A. Jain, R. Bolle
  • Proceedings of the Second ACM Workshop on Privacy…
  • 2003

Sudan . A fuzzy vault scheme

  • A. Juels, M. Wattenberg.
  • Proceedings of the 2002 IEEE International…
  • 2002

Similar Papers

Loading similar papers…