Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System
A biometric identification system was recently developed and analyzed as a secure mechanism for user authentication. The system provided for the confidentiality, without the use of cryptographic encryption, of the user’s biometric information stored in public verification templates.
Here we demonstrate that the use of majority decoding can enhance the prior techniques in several ways. One enhancement allows the biometric authentication system to leak no information about a user’s biometric when using the proper computational assumptions. Another enhancement is a passive identification system.
KeywordsHash Function Random Oracle Legitimate User Biometric System Biometric Template
Unable to display preview. Download preview PDF.
- [BAW96]F. Bouchier, J.S. Ahrens, and G. Wells. Laboratory evaluation of the iriscan prototype biometric identifier. Technical Report SAND96-1033, Sandia National Laboratories USA, April 1996.Google Scholar
- [Ber68]E.R. Berlekamp. Algebraic Coding Theory. McGraw-Hill, 1968.Google Scholar
- [BR93]M. Bellare and R. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. In Proceedings of the 1st ACM conference on Computers and Communications Security, 1993.Google Scholar
- [Can97]R. Canetti. Towards realizing random oracles: Hash functions which hide all partial information. In Advances in Cryptology. Proc. of Crypto’97, pages 455–469, 1997.Google Scholar
- [Dau92]J. Daugman. High confidence personal identifications by rapid video analysis of iris texture. In IEEE International Carnahan Conference on Security Technology, pages 50–60, 1992.Google Scholar
- [DFM98]G.I. Davida, Y. Frankel, and B.J. Matt. On enabling secure applications through off-line biometric identification. In 1998 IEEE Symposium on Security and Privacy, pages 148–157, 1998.Google Scholar
- [DFMP]G.I. Davida, Y. Frankel, B. Matt and R. Peralta, ’On the relation of error correction and cryptography to an offine biometric based identification scheme. In Proceedings of the Workshop on Codes and Cryptography 1999.Google Scholar
- [HMW90]J.P. Holmes, R.L. Maxell, and L.J. Wright. A performance evaluation of biometric identification devices. Technical report, Sandia National Laboratories, July 1990.Google Scholar
- [MS78]F.J. MacWilliams and N.J.A. Sloane. The theory of error-correcting codes. North-Holland Publishing Company, 1978.Google Scholar
- [PW88]W. W. Peterson and E.J. Weldon. Error Correcting Codes. The MIT Press, 1988.Google Scholar
- [Wil96]G.O. Williams. Iris recognition technology. In IEEE International Carnahan Conference on Security Technology, pages 46–59, 1996.Google Scholar