Secure Remote Biometric Authentication Protocol

Article Preview

Abstract:

The secure remote biometric authentication protocol proposed in this paper solves the problem from the nature of the biometric data. The proposed protocol preserves the privacy of the users biometric data when it is transmitted in the protocol. The liveness property of the protocol guarantees that the biometric data used to authenticate the user comes from the live presentation of the user. The most important property related with the intentional authentication; it confirms that the purpose of the user authentication correspondences to the users purpose. The proposed secure remote biometric authentication protocol promises three properties so that the user is confident with the security level that the protocol offers and it guarantees that the protocol does not manipulate with an intruder.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 931-932)

Pages:

1437-1440

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] N. Ratha , J. Connell, R. Bolle, A biometrics-based secure authentication system, available at URL http: /www. research. ibm. com/ecvg/pubs/ratha-chall. pdf (2008).

Google Scholar

[2] A. Salaiwarakul, M. Ryan, Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol, In Proceedings of the 4th Information Security Practice and Experience Conference (2008) 1-13.

DOI: 10.1007/978-3-540-79104-1_1

Google Scholar

[3] A. Salaiwarakul, M. Ryan, Analysis of a Biometric Authentication Protocol for Signature Creation Application, In Proceedings of the 3rd International Workshop on Security (2008) 231-245.

DOI: 10.1007/978-3-540-89598-5_16

Google Scholar

[4] Tusted Computing Group.: TPM Specification version 1. 2 Parts 1-3, available at URL http: /www. trustedcomputinggroup. org/ resources/ (2009).

Google Scholar

[5] L. Chen, S. Pearson, A. Vamvakas, Trusted Biometric System, available at URL http: /www. hpl. hp. com/techreports/2002/HPL-2002-185. pdf (2002).

Google Scholar