Affiliation:
1. Department of Electrical Engineering, Chang Gung University, 259 Wen-Hwa 1st Road, Kwei-Shan, Taoyuan 333, Taiwan
Abstract
Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.
Subject
General Immunology and Microbiology,General Biochemistry, Genetics and Molecular Biology,General Medicine
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Blockchain Technology in Biometric Database System;2022 3rd International Conference on Computation, Automation and Knowledge Management (ICCAKM);2022-11-15
2. Techniques for the Enhancement of Biometric Security: A Review;2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO);2022-10-13
3. Strengthening Elliptic Curve Cryptography—Key Generation via Biometric Fusion Approach;Advances in Intelligent Systems and Computing;2019-10-17
4. A Cryptographic Algorithm Using Location-Based Service and Biometrics;Data Management, Analytics and Innovation;2018-08-10
5. Two-phase authentication and encryption algorithm for mobile users;2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR);2018-05