Revisiting Yasuda et al.’s Biometric authentication protocol: Are you private enough?

0Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Biometric Authentication Protocols (BAP s) have increasingly been employed to guarantee reliable access control to places and services. However, it is well-known that biometric traits contain sensitive information of individuals and if compromised could lead to serious security and privacy breaches. Yasuda et al. [23] proposed a distributed privacy-preserving BAP which Abidin et al. [1] have shown to be vulnerable to biometric template recovery attacks under the presence of a malicious computational server. In this paper, we fix the weaknesses of Yasuda et al.’s BAP and present a detailed instantiation of a distributed privacy-preserving BAP which is resilient against the attack presented in [1]. Our solution employs Backes et al.’s [4] verifiable computation scheme to limit the possible misbehaviours of a malicious computational server.

Cite

CITATION STYLE

APA

Pagnin, E., Liu, J., & Mitrokotsa, A. (2018). Revisiting Yasuda et al.’s Biometric authentication protocol: Are you private enough? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11261 LNCS, pp. 161–178). Springer Verlag. https://doi.org/10.1007/978-3-030-02641-7_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free