In this work, we propose a novel secure key agreement protocol, Secure Key Agreement using Pure Ordered Biometrics (SKA-POB), in which the cryptographic keys are generated using an ordered set of biometrics, without any extra shared secret data or keys. The proposed approach is instantiated using iris biometrics. Our protocol makes use of hash functions and HMAC (Hash-based Message Authentication Code) as the only cryptographic primitives; thus, it is not cryptographically resource-hungry. We also propose and integrate a window-based comparison strategy and a window reset method in SKA-POB. This way, performance is maximized without sacrificing security. Furthermore, we propose an intelligent fake block generation and distribution strategy ...
Cryptographic credentials allow user authorizations to be granted and verified. and have such applic...
Cryptography and biometrics are widely used in providing information security. Cryptographic systems...
Biometric data offer a potential source of high-entropy, secret information that can be used in cryp...
In this work, we propose a novel secure key agreement protocol, Secure Key Agreement using Pure Orde...
In this work, we propose a novel secure key agreement protocol, Secure Key Agreement using Pure Ord...
In this paper, we propose two novel biometrics-based secure key agreement protocols, namely Secure K...
In this paper, we propose a novel secure key agreement protocol that uses biometrics with unordered ...
Nowadays, many of the security-providing applications use biometrics-based authentication. However, ...
Abstract. Biometric data offer a potential source of high-entropy, secret information that can be us...
International audienceCrypto-biometric systems, which combine biometrics with cryptographic systems,...
With the security requirements of networks, biometrics authenticated schemes which are applied in th...
Cryptography provides the secure manner of information transmission over the insecure channel. It au...
A secure key agreement scheme plays a major role in protecting communications between the users usin...
Biometric data is user-identifiable and therefore methods to use biometrics for authentication have ...
Biometric keys are widely used in the digital identity system due to the inherent uniqueness of biom...
Cryptographic credentials allow user authorizations to be granted and verified. and have such applic...
Cryptography and biometrics are widely used in providing information security. Cryptographic systems...
Biometric data offer a potential source of high-entropy, secret information that can be used in cryp...
In this work, we propose a novel secure key agreement protocol, Secure Key Agreement using Pure Orde...
In this work, we propose a novel secure key agreement protocol, Secure Key Agreement using Pure Ord...
In this paper, we propose two novel biometrics-based secure key agreement protocols, namely Secure K...
In this paper, we propose a novel secure key agreement protocol that uses biometrics with unordered ...
Nowadays, many of the security-providing applications use biometrics-based authentication. However, ...
Abstract. Biometric data offer a potential source of high-entropy, secret information that can be us...
International audienceCrypto-biometric systems, which combine biometrics with cryptographic systems,...
With the security requirements of networks, biometrics authenticated schemes which are applied in th...
Cryptography provides the secure manner of information transmission over the insecure channel. It au...
A secure key agreement scheme plays a major role in protecting communications between the users usin...
Biometric data is user-identifiable and therefore methods to use biometrics for authentication have ...
Biometric keys are widely used in the digital identity system due to the inherent uniqueness of biom...
Cryptographic credentials allow user authorizations to be granted and verified. and have such applic...
Cryptography and biometrics are widely used in providing information security. Cryptographic systems...
Biometric data offer a potential source of high-entropy, secret information that can be used in cryp...