نتایج جستجو برای: biometric encryption
تعداد نتایج: 36436 فیلتر نتایج به سال:
This work addresses the security and privacy issues in remote biometric authentication by proposing an efficient mechanism to verify the correctness of the outsourced computation in such protocols. In particular, we propose an efficient verifiable computation of XORing encrypted messages using an XOR linear message authentication code (MAC) and we employ the proposed scheme to build a biometric...
Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biometrics might reveal more information than the identity itself, as well as provide the ability to track users over an extended period of time. In this paper, we propose an authentication protocol that alleviates these co...
We show how any party can encrypt data for an e-passport holder such that only with physical possession of the e-passport decryption is possible. The same is possible for electronic identity cards and driver licenses. We also indicate possible applications. Dutch passports allow for 160 bit security, theoretically giving sufficient security beyond the year 2079, exceeding current good practice ...
In general, the identification and verification are done by passwords, PIN number, etc., which can be easily cracked by hackers. Biometrics is a powerful and unique tool based on the anatomical and behavioural characteristics of the human beings in order to prove their authentication. Security is the most important thing in the world. Password is used for security, but it does not provide the e...
Recently, biometric security has become the major study to address biometric template security and user privacy. In this research, we focus on minutiae based fingerprint template protection. At the local level, two most prominent ridge characteristics of fingerprint, namely ridge termination and ridge bifurcation are detected to form minutia point (minutiae). In this context, a ridge ending is ...
Secure sketches and fuzzy extractors enable the use of biometric data in cryptographic applications by correcting errors in noisy biometric readings and producing cryptographic materials suitable for authentication, encryption, and other purposes. Such constructions work by producing a public sketch, which is later used to reproduce the original biometric and all derived information exactly fro...
Cloud computing has gained popularity due to the growth of internet and the number of devices. Although outsourcing computation tasks to the remote cloud come with great convenience, there are increasing concerns regarding data privacy and computation integrity since the cloud providers are external third parties. Verifiable computation (VC) is a mechanism to let the client verify the computati...
Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing ...
Various cancelable biometric techniques have been proposed to maintain user data security. In this work, a framework is introduced satisfy security and keeping the original template safe away from intruders. Thus, our main contribution presenting novel authentication based on evolutionary Genetic Algorithm (GA)-based encryption technique. The suggested produces an entirely unrecognized by hidin...
Fuzzy identity-based encryption (FIBE) has found many applications, such as biometric-based encryption, since its notion was firstly proposed by Sahai and Waters [15]. In this paper, we show how to minimize the damage of secret key exposure in FIBE. We introduce a new notion which we call fuzzy identity-based key-insulated encryption (FIBKIE). In FIB-KIE, the secret key associated with an ident...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید