Abstract
n recent years, public key infrastructure (PKI) has emerged as co‐existent with the increasing demand for digital security. A digital signature is created using existing public key cryptography technology. This technology will permit commercial transactions to be carried out across insecure networks without fear of tampering or forgery. The relative strength of digital signatures relies on the access control over the individual’s private key. The private key storage, which is usually password‐protected, has long been a weak link in the security chain. In this paper, we describe a novel and feasible system – BioPKI cryptosystem – that dynamically generates private keys from users’ on‐line handwritten signatures. The BioPKI cryptosystem eliminates the need of private key storage. The system is secure, reliable, convenient and non‐invasive. In addition, it ensures non‐repudiation to be addressed on the maker of the transaction instead of the computer where the transaction occurs.
Subject
Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems
Reference6 articles.
1. NIST (1992), “The digital signature standard proposed by NIST”, Communications of the ACM, Vol. 35 No. 7, July, pp. 120‐6.
2. Pawan, K.J. and Siyal, M.Y. (2001), “Novel biometric digital signatures for Internet based applications”, Information Management & Computer Security, Vol. 9 No. 5, pp. 205‐12.
3. Ross, J.A. (1994), “Whither cryptography?”, Information Management & Computer Security, Vol. 2 No. 5, pp. 13‐20.
4. Sankoff, D. and Kruskal, J.B. (1983), Time Warps, String Edits, and Macromolecules: The Theory and Practice of Sequence Comparison, Addison‐Wesley Publishing, Reading, MA, pp. 125‐60.
5. Scheneier, B. (1996), Applied Cryptography, 2nd ed., John Wiley & Sons, New York, NY.
Cited by
107 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献