Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses oblivious transfer and provides security in the semi-honest model. The other scheme uses committed oblivious transfer and is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometric authentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form. In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, our attack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance, which is different from the actual va...
Naor and Pinkas (1999a) pointed out that 'this is of interest, given the possibility of implementing...
Being unique and immutable for each person, biometric signals are widely used in access control syst...
The communication between an honest prover and an honest verifier can be intercepted by a malicious ...
Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their f...
and Patey proposed two biometric authentication schemes be-tween a prover and a verifier where the v...
We introduce two new schemes for securely computing Hamming distance in the two-party setting. Our f...
Biometric authentication is a protocol which verifies a user’s authority by comparing her biometric ...
Concerns of privacy, template security and efficiency of biometric authentication systems have recei...
Distance-bounding protocols form a family of challenge–response authentication protocols that have b...
In this paper, we propose a novel secure key agreement protocol that uses biometrics with unordered ...
In biometric authentication protocols, a user is authenticated or granted access to a service if her...
Distance-bounding protocols form a family of challenge-response authentication protocols that have b...
Part 1: Modern CryptographyInternational audienceAmong many approaches for privacy-preserving biomet...
This research focuses on user authentication, especially the privacy-preserving biometrics authentic...
Abstract. Biometric authentication establishes the identity of an indi-vidual based on biometric tem...
Naor and Pinkas (1999a) pointed out that 'this is of interest, given the possibility of implementing...
Being unique and immutable for each person, biometric signals are widely used in access control syst...
The communication between an honest prover and an honest verifier can be intercepted by a malicious ...
Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their f...
and Patey proposed two biometric authentication schemes be-tween a prover and a verifier where the v...
We introduce two new schemes for securely computing Hamming distance in the two-party setting. Our f...
Biometric authentication is a protocol which verifies a user’s authority by comparing her biometric ...
Concerns of privacy, template security and efficiency of biometric authentication systems have recei...
Distance-bounding protocols form a family of challenge–response authentication protocols that have b...
In this paper, we propose a novel secure key agreement protocol that uses biometrics with unordered ...
In biometric authentication protocols, a user is authenticated or granted access to a service if her...
Distance-bounding protocols form a family of challenge-response authentication protocols that have b...
Part 1: Modern CryptographyInternational audienceAmong many approaches for privacy-preserving biomet...
This research focuses on user authentication, especially the privacy-preserving biometrics authentic...
Abstract. Biometric authentication establishes the identity of an indi-vidual based on biometric tem...
Naor and Pinkas (1999a) pointed out that 'this is of interest, given the possibility of implementing...
Being unique and immutable for each person, biometric signals are widely used in access control syst...
The communication between an honest prover and an honest verifier can be intercepted by a malicious ...