Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security AND Privacy

نویسندگان

  • Ann Cavoukian
  • Alex Stoianov
چکیده

.................................................................................................................... 1 Background / Context ............................................................................................... 2 Growing Public Awareness and Interest .............................................................. 3 A Biometrics Primer ............................................................................................. 4 Traditional Biometrics: Privacy vs. Security – A Zero-Sum Game ......................... 4 Biometric Identification vs. Verification ............................................................... 6 Problems with using Biometrics for Identification Purposes ................................. 7 Views of the Privacy Community ....................................................................... 10 Deployment Experience to Date ........................................................................ 11 Security Vulnerabilities of a Biometric System .................................................... 12 Biometric Encryption ............................................................................................... 15 Biometrics and Cryptography ............................................................................ 15 What is Biometric Encryption? .......................................................................... 15 Advantages of Biometric Encryption (over other Biometric Systems) ................. 17 1. NO retention of the biometric image or template .............................................. 17 2. Multiple / cancellable / revocable identifiers ....................................................... 17 3. Improved authentication security: stronger binding of user biometric and identifier ...................................................................... 18 4. Improved security of personal data and communications ................................... 18 5. Greater public confidence, acceptance, and use; greater compliance with privacy laws ............................................................. 19 6. Suitable for large-scale applications ................................................................... 19 Current State of Biometric Encryption ............................................................... 22 Related Technologies ........................................................................................ 24 Scientific, Technological, and Privacy-Related Merits ........................................ 25 Case Study #1: Small-scale use of Biometric Encryption ................................... 26 Case Study #2: Anonymous database; large or medium-scale applications......... 27 Case Study #3: Travel documents; large-scale database applications .................. 28 Next Steps to Bringing Biometric Encryption to the Prototype Stage ................. 29 Summary and Conclusions ....................................................................................... 31 Appendix 1 — Privacy References ............................................................................ 32 Current International Work on Biometrics ........................................................ 32 Information and Privacy Commissioner of Ontario, Canada .................................. 32 Canada .................................................................................................................. 32 European Data Protection Supervisor .................................................................... 33 Relevant Documents Adopted by the Article 29 Working Party .............................. 34 International Data Protection Commissioners ........................................................ 35 Other EU ............................................................................................................... 35 COE ...................................................................................................................... 36 OECD ................................................................................................................... 37 United States ......................................................................................................... 37 MISC .................................................................................................................... 37 Biometrics Web Sites .............................................................................................. 39 Biometrics Research Sites ....................................................................................... 39 Appendix 2 — Technical References ......................................................................... 40 Publications on Biometric Encryption and related technologies ......................... 40 Related Technologies ......................................................................................... 43 List of Publications ............................................................................................ 43 Information and Privacy Commissioner of Ontario

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

High Secure Crypto Biometric Authentication Protocol

Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and privacy. The use of cryptographic primitives to bolster the authentication process can alleviate some of these concerns as shown by biometric cryptosystems. In this paper, we propose a provably secure and blind biometric authentication protocol, which addresses the c...

متن کامل

An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication

This work deals with the security challenges in authentication protocols employing volatile biometric features, where the authentication is indeed a comparison between a fresh biometric template and that enrolled during the enrollment phase. We propose a security model for biometric-based authentication protocols by assuming that the biometric features to be public. Extra attention is paid to t...

متن کامل

On Privacy-Preserving Biometric Authentication

Biometric authentication is becoming increasingly popular as a convenient authentication method. However, the privacy and security issues associated with biometric authentication are very serious. Privacy-preserving biometric authentication addresses privacy concerns associated with the use of biometrics and offers a secure solution for user authentication. Given the tremendous expansion of wir...

متن کامل

Biometric cryptosystems: authentication, encryption and signature for biometric identities

Zusammenfassung) Biometrics have been used for secure identification and authentication for more than two decades since biometric data is unique, non-transferable, unforgettable, and always with us. Recently, biometrics has pervaded other aspects of security applications that can be listed under the topic of “Biometric Cryptosystems”. Although the security of some of these systems is questionab...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007