Private eyes: Secure remote biometric authentication

Ewa Syta, Michael J. Fischer, David Wolinsky, Abraham Silberschatz, Gina Gallegos-García, Bryan Ford

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

We propose an efficient remote biometric authentication protocol that gives strong protection to the user's biometric data in case of two common kinds of security breaches: (1) loss or theft of the user's token (smart card, handheld device, etc.), giving the attacker full access to any secrets embedded within it; (2) total penetration of the server. Only if both client and server are simultaneously compromised is the user's biometric data vulnerable to exposure. The protocol works by encrypting the user's biometric template in a way that allows it to be used for authentication without being decrypted by either token or server. Further, the encrypted template never leaves the token, and only the server has the information that would enable it to be decrypted. We have implemented our protocol using two iris recognition libraries and evaluated its performance. The overall efficiency and recognition performance is essentially the same compared to an unprotected biometric system.

Original languageEnglish
Title of host publicationSECRYPT 2015 - 12th International Conference on Security and Cryptography, Proceedings; Part of 12th International Joint Conference on e-Business and Telecommunications, ICETE 2015
EditorsMohammad S. Obaidat, Pascal Lorenz, Pierangela Samarati
PublisherSciTePress
Pages243-250
Number of pages8
ISBN (Electronic)9789897581175
DOIs
StatePublished - 2015
Event12th International Conference on Security and Cryptography, SECRYPT 2015 - Colmar, Alsace, France
Duration: 20 Jul 201522 Jul 2015

Publication series

NameSECRYPT 2015 - 12th International Conference on Security and Cryptography, Proceedings; Part of 12th International Joint Conference on e-Business and Telecommunications, ICETE 2015

Conference

Conference12th International Conference on Security and Cryptography, SECRYPT 2015
Country/TerritoryFrance
CityColmar, Alsace
Period20/07/1522/07/15

Keywords

  • Authentication
  • Biometrics
  • Privacy
  • Security

Fingerprint

Dive into the research topics of 'Private eyes: Secure remote biometric authentication'. Together they form a unique fingerprint.

Cite this