Abstract
Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biometrics might reveal more information than the identity itself, as well as provide the ability to track users over an extended period of time. In this paper, we propose an authentication protocol that alleviates these concerns. The protocol takes care of user privacy, template protection and trust issues in biometric authentication systems. The protocol uses asymmetric encryption, and captures the advantages of biometric authentication. The protocol provides non-repudiable identity verification, while not revealing any additional information about the user to the server or vice versa. We show that the protocol is secure under various attacks. Experimental results indicate that the overall method is efficient to be used in practical scenarios.
Chapter PDF
Similar content being viewed by others
Keywords
- Support Vector Machine
- Smart Card
- Authentication Protocol
- Homomorphic Encryption
- Biometric Authentication
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology 14(1), 4–20 (2004)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3), 614–634 (2001)
Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur. 2007(1), 1–15 (2007)
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process. 8(2), 1–17 (2008)
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: Issues and challenges. Proceedings of the IEEE 92(6), 948–960 (2004)
Ratha, N., Chikkerur, S., Connell, J., Bolle, R.: Generating cancelable fingerprint templates. IEEE Trans. on PAMI 29(4), 561–572 (2007)
Teoh, A., Jin, B., Connie, T., Ngo, D., Ling, C.: Remarks on BioHash and its mathematical foundation. Information Processing Letters 100(4), 145–150 (2006)
Kong, A., Cheung, K., Zhang, D., Kamel, M., You, J.: An analysis of biohashing and its variants. Pattern Recognition 39(7), 1359–1368 (2006)
Juels, A., Sudan, M.: A fuzzy vault scheme. DCC 38(2), 237–257 (2006)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)
Walter, J.S., Boult, T.E.: Cracking fuzzy vaults and biometric encryption. In: Biometrics Symposium (2007)
Nagai, K., Kikuchi, H., Ogata, W., Nishigaki, M.: ZeroBio: Evaluation and development of asymmetric fingerprint authentication system using oblivious neural network evaluation protocol. In: Proceedings of ARES 2007, pp. 1155–1159 (2007)
Farooq, F., Bolle, R.M., Jea, T.Y., Ratha, N.: Anonymous and revocable fingerprint recognition. In: Proceedings of the Biometrics Worshop (CVPR 2007), pp. 1–7 (2007)
Menezes, A., van, O., Paul, C., Vanstone, S.A.: Handbook of Applied Cryptography (1996)
Abe, S.: Support Vector Machines For Pattern Classification. Springer, Heidelberg (2005)
Jain, A.K., Ross, A., Pankanti, S.: A prototype hand geometry-based verification system. In: Proceedings of the AVBPA 1999, pp. 166–171 (1999)
Wang, Y., Han, J.: Iris recognition using SVM. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3173, pp. 622–628. Springer, Heidelberg (2004)
Blum, T., Paar, C.: High-radix montgomery modular exponentiation on reconfigurable hardware. IEEE Transactions on Computers 50(7), 759–764 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Upmanyu, M., Namboodiri, A.M., Srinathan, K., Jawahar, C.V. (2009). Efficient Biometric Verification in Encrypted Domain. In: Tistarelli, M., Nixon, M.S. (eds) Advances in Biometrics. ICB 2009. Lecture Notes in Computer Science, vol 5558. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01793-3_91
Download citation
DOI: https://doi.org/10.1007/978-3-642-01793-3_91
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01792-6
Online ISBN: 978-3-642-01793-3
eBook Packages: Computer ScienceComputer Science (R0)