نتایج جستجو برای: biometric encryption

تعداد نتایج: 36436  

2016
Aysajan Abidin Abdelrahaman Aly Enrique Argones-Rúa Aikaterini Mitrokotsa

This work addresses the security and privacy issues in remote biometric authentication by proposing an efficient mechanism to verify the correctness of the outsourced computation in such protocols. In particular, we propose an efficient verifiable computation of XORing encrypted messages using an XOR linear message authentication code (MAC) and we employ the proposed scheme to build a biometric...

2009
Maneesh Upmanyu Anoop M. Namboodiri K. Srinathan C. V. Jawahar

Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biometrics might reveal more information than the identity itself, as well as provide the ability to track users over an extended period of time. In this paper, we propose an authentication protocol that alleviates these co...

Journal: :CoRR 2017
Eric R. Verheul

We show how any party can encrypt data for an e-passport holder such that only with physical possession of the e-passport decryption is possible. The same is possible for electronic identity cards and driver licenses. We also indicate possible applications. Dutch passports allow for 160 bit security, theoretically giving sufficient security beyond the year 2079, exceeding current good practice ...

Journal: :Int. Arab J. Inf. Technol. 2015
Muthukumar Arunachalam Subramanian Kannan

In general, the identification and verification are done by passwords, PIN number, etc., which can be easily cracked by hackers. Biometrics is a powerful and unique tool based on the anatomical and behavioural characteristics of the human beings in order to prove their authentication. Security is the most important thing in the world. Password is used for security, but it does not provide the e...

Journal: :Expert Syst. Appl. 2012
Zhe Jin Andrew Beng Jin Teoh Thian Song Ong Connie Tee

Recently, biometric security has become the major study to address biometric template security and user privacy. In this research, we focus on minutiae based fingerprint template protection. At the local level, two most prominent ridge characteristics of fingerprint, namely ridge termination and ridge bifurcation are detected to form minutia point (minutiae). In this context, a ridge ending is ...

Journal: :IACR Cryptology ePrint Archive 2012
Marina Blanton Mehrdad Aliasgari

Secure sketches and fuzzy extractors enable the use of biometric data in cryptographic applications by correcting errors in noisy biometric readings and producing cryptographic materials suitable for authentication, encryption, and other purposes. Such constructions work by producing a public sketch, which is later used to reproduce the original biometric and all derived information exactly fro...

2015
JING LIU

Cloud computing has gained popularity due to the growth of internet and the number of devices. Although outsourcing computation tasks to the remote cloud come with great convenience, there are increasing concerns regarding data privacy and computation integrity since the cloud providers are external third parties. Verifiable computation (VC) is a mechanism to let the client verify the computati...

Journal: :Entropy 2017
Lavinia Mihaela Dinca Gerhard P. Hancke

Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing ...

Journal: :IEEE Access 2021

Various cancelable biometric techniques have been proposed to maintain user data security. In this work, a framework is introduced satisfy security and keeping the original template safe away from intruders. Thus, our main contribution presenting novel authentication based on evolutionary Genetic Algorithm (GA)-based encryption technique. The suggested produces an entirely unrecognized by hidin...

2008
Jin Li Kwangjo Kim

Fuzzy identity-based encryption (FIBE) has found many applications, such as biometric-based encryption, since its notion was firstly proposed by Sahai and Waters [15]. In this paper, we show how to minimize the damage of secret key exposure in FIBE. We introduce a new notion which we call fuzzy identity-based key-insulated encryption (FIBKIE). In FIB-KIE, the secret key associated with an ident...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید