Bauspieß, 2024 - Google Patents
Post-Quantum Secure Biometric SystemsBauspieß, 2024
View PDF- Document ID
- 4074586374873906191
- Author
- Bauspieß P
- Publication year
External Links
Snippet
Biometrics, which is defined as the automated recognition of individuals based on their behavioural and biological characteristics, can be applied to increase the trust and usability of digital interactions. Due to their uniqueness and persistence, biometric characteristics …
- 238000012795 verification 0 abstract description 31
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Natgunanathan et al. | Protection of privacy in biometric data | |
Bringer et al. | Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends | |
Morampudi et al. | Privacy-preserving iris authentication using fully homomorphic encryption | |
US8966277B2 (en) | Method for authenticating an encryption of biometric data | |
Rane et al. | Secure biometrics: Concepts, authentication architectures, and challenges | |
Šeděnka et al. | Secure outsourced biometric authentication with performance evaluation on smartphones | |
Barni et al. | SEMBA: secure multi‐biometric authentication | |
Mahesh Kumar et al. | BMIAE: blockchain‐based multi‐instance iris authentication using additive ElGamal homomorphic encryption | |
Alberto Torres et al. | Privacy-preserving biometrics authentication systems using fully homomorphic encryption | |
WO2019018046A1 (en) | Practical reusable fuzzy extractor based on the learning-with-error assumption and random oracle | |
Jindal et al. | Secure and privacy preserving method for biometric template protection using fully homomorphic encryption | |
Torres et al. | Effectiveness of fully homomorphic encryption to preserve the privacy of biometric data | |
Penn et al. | Customisation of paillier homomorphic encryption for efficient binary biometric feature vector matching | |
Sarier | Privacy Preserving Biometric Authentication on the blockchain for smart healthcare | |
Abidin | On privacy-preserving biometric authentication | |
Nguyen et al. | Privacy preserving biometric‐based remote authentication with secure processing unit on untrusted server | |
Ye et al. | Anonymous biometric access control | |
Hidano et al. | Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme | |
Bauspieß et al. | BRAKE: Biometric Resilient Authenticated Key Exchange | |
Morampudi et al. | Multi-instance iris remote authentication using private multi-class perceptron on malicious cloud server | |
Bhargav-Spantzel et al. | Biometrics-based identifiers for digital identity management | |
Bauspieß et al. | HEBI: Homomorphically encrypted biometric indexing | |
Seo et al. | Construction of a New Biometric‐Based Key Derivation Function and Its Application | |
Bauspieß | Post-Quantum Secure Biometric Systems | |
Sutcu et al. | Secure sketches for protecting biometric templates |