Biometric Digital Signature Key Generation

Publication: Communications of the ACMFebruary 2000 https://doi.org/10.1145/328236.328110

Dec 01, 2001 This paper introduces the notion of biometric signature – a new approach to integrate biometrics with public key infrastructure, using biometric based digital signature generation which is secure, efficacious, fast, convenient, non‐invasive and correctly identifies the maker of a transaction. Biometric Digital Signature Key Generation 39 From the technical point of view, this work proposes several biometric dig-ital key and signature generation frameworks to ensure data integrity, mutual authentication, and confidentiality. From the practical perspective, this work de.

  • This alert has been successfully added and will be sent to:

    You will be notified whenever a record that you have chosen has been cited.

    To manage your alert preferences, click on the button below.

    Manage my Alerts

    Please log in to your account

  • Save to Binder
    Create a New Binder
  1. 1.Biometrics Consortium homepage; www.biometrics.org.Google Scholar
  2. 2.Chellappa, R., Wilson, C., and Sirohey, A. Human and machine recognition of faces: A survey. In Proceedings of the IEEE 83, 5 (1995) 705-740.Google ScholarCross Ref
  3. 3.Daugman, J.G. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. and Machine Intell. 15, 11 (1993)1148-1161. Google ScholarDigital Library
  4. 4.Furui, S. Recent advances in speaker recognition. Pattern Recognition Letters 18 (1997) 859-872.Google ScholarCross Ref
  5. 5.Jain, A.K. Bolle, R. and Pankanti S. (eds.). Biometrics: Personal Identification in Networked Society. Kluwer, New York, 1999. Google ScholarDigital Library
  6. 6.Jain, A.K., Hong, L., Pankanti, S., and Bolle, R. An identityauthentication system using fingerprints. In Proceedings of the IEEE 85, 9 (1997), 1365-1388. Google ScholarDigital Library
  7. 7.Nalwa, V. Automatic on-line signature verification. In Proceedings of the IEEE 85, 2 (1997), 213-239.Google ScholarCross Ref
  8. 8.Miller, B. Vital signs of identity. IEEE Spectrum 31, 2 (1994), 22-30. Google ScholarDigital Library
  9. 9.Sidlauskas, D.R. 3D hand profile identification apparatus. U.S. Patent No. 4736203, 1988.Google Scholar
  10. 10.Hill, R.B. Apparatus and method for identifying individuals through their retinal vasculature patterns. US Patent No. 4109237, 1978.Google Scholar
  11. 11.Prokoski, F.K. Disguise detection and identification using infrared imagery. In the Proceedings of SPIE, Optics, and Images in Law Enforcement II. A.S. Hecht, Ed. (Arlington, VA, May, 1982), 27-31.Google Scholar
  12. 12.Wayman, J.L. Error Rate Equations for the General Biometric System. IEEE Robotics & Automation 6, 9 (Jan. 1999), 35-48.Google Scholar
  1. Biometric identification
Please enable JavaScript to view thecomments powered by Disqus.

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Biometric Digital Safe

Sign inBiometric

Full Access

Digital signature in word
  • Article Metrics

    • Total Citations
      View Citations
    • Total Downloads
    • Downloads (Last 12 months)395
    • Downloads (Last 6 weeks)163

    Other Metrics

PDF Format

eReader

Biometric Digital Signature Key Generation Download

Digital Edition

View this article in digital edition.

View Digital Edition

HTML Format

Digital Signature Free

View this article in HTML Format .

View HTML Format

Biometric Digital Signature Key Generation Plus

  1. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)zbMATHCrossRefGoogle Scholar
  2. Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society (AMS) 46(2), 203–213 (1999)zbMATHGoogle Scholar
  3. ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Transactions on Information Theory IT-30(4), 469–472 (1985)CrossRefGoogle Scholar
  4. Juels, A., Sudan, M.: A Fuzzy Vault Scheme, also available at http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/fuzzy-vault/fuzzy_vault.pdf
  5. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, pp.287-291, pp.312-315. CRC Press, Boca Raton, USA (1997)zbMATHGoogle Scholar
  6. Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)Google Scholar
  7. Nagpal, R., Nagpal, S.: Biometric based digital signature scheme. Internet-Draft, draft-nagpal-biometric-digital-signature-00.txt (May 2002)Google Scholar
  8. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to generate strong keys from biometric identification. In: Proceedings of the Security and Privacy, IEEE Computer Society Press, Los Alamitos (1998)Google Scholar
  9. Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometrics. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147–163. Springer, Heidelberg (2005)Google Scholar
  10. Soutar, C.: Biometric system performance and security (2002), Manuscript available at http://www.bioscrypt.com/assets/biopaper.pdf
  11. Jain, A., Hong, L., Pankanti, S.: Biometric identification. Communications of the ACM (February 2000)Google Scholar
  12. Janbandhu, P., Siyal, M.: Novel biometric digital signatures for Internet-based applications. Information Man-agement & Computer Security 9(5), 205–212 (2001)CrossRefGoogle Scholar
  13. Kwon, T., Lee, J.: Practical digital signature generation using biometrics. In: Laganà, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, Springer, Heidelberg (2004)Google Scholar
  14. Orvos, P.: Towards biometric digital signatures. Networkshop, pp. 26–28. Eszterhazy College, Eger (March 2002)Google Scholar