Computer Science – Cryptography and Security
Scientific paper
2011-01-13
Computer Science
Cryptography and Security
10 pages, 1 figures, submitted to IEEE Transactions on Information Forensics and Security
Scientific paper
In this paper we analyze different biometric authentication protocols considering an internal adversary. Our contribution takes place at two levels. On the one hand, we introduce a new comprehensive framework that encompasses the various schemes we want to look at. On the other hand, we exhibit actual attacks on recent schemes such as those introduced at ACISP 2007, ACISP 2008, and SPIE 2010, and some others. We follow a blackbox approach in which we consider components that perform operations on the biometric data they contain and where only the input/output behavior of these components is analyzed.
Bringer Julien
Chabanne Herve
Seys Stefaan
Simoens Koen
No associations
LandOfFree
Analysis of Biometric Authentication Protocols in the Blackbox Model does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Analysis of Biometric Authentication Protocols in the Blackbox Model, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Analysis of Biometric Authentication Protocols in the Blackbox Model will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-66612