Sciweavers

FC
2005
Springer

Secure Biometric Authentication for Weak Computational Devices

14 years 5 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can later be used to impersonate the user (or reveal personal biometric information). Unlike some previous computationally expensive schemes — which make use of slower cryptographic primitives — this paper presents methods that are particularly suited to financial institutions that authenticate users with biometric smartcards, sensors, and other computationally limited devices. In our schemes, the client and server need only perform cryptographic hash computations on the feature vectors, and do not perform any expensive digital signatures or public-key encryption operations. In fact, the schemes we present have properties that make them appealing even in a framework of powerful devices capable of public-key signatures and encryptions. Our schemes make it computationally infeasible for an attacker to imperso...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G
Added 27 Jun 2010
Updated 27 Jun 2010
Type Conference
Year 2005
Where FC
Authors Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia
Comments (0)