Seminar Biometry & Security
Corresponding entry in Aachen Campus, Bonn University.
Responsable
Lecture
Time & Place
- Monday, 1700- 1830, b-it 2.1.
First meeting : Monday 26 October 2009, 1630, b-it 2.1.
If you are interested in the seminar, please write an email to Laila El Aimani containing the keyword "Seminar " in the subject.
Allocation
2 SWS, 4 credits
- Media Informatics, Computer and Communication Technology.
- University of Bonn - Computer Science, A or A1.
- University of Bonn - Mathematics.
Credit Requirements
- Meet with the tutor two weeks before the date of your presentation.
- A further mandatory meeting may be scheduled.
- Give your presentation.
- Submit a report in pdf-format on the day of your presentation.
- Attend all but at most two sessions.
Prerequisites
None.
Schedule of presentations
- 16.11.2009
- Markus Hirtsiefer. A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. [presentation] [report]
- Vladimir Zelenevskiy. Secure biometric authentication for weak computational devices. [presentation] [report]
- 23.11.2009
- Andreas Dresen. An Authentication Protocol with Encrypted Biometric Data.[presentation][report]
- Sumukhi Chandrashekar. Extended Private Information Retrieval and Its Application in Biometrics Authentications. [presentation] [report]
- 30.11.2009
- Damian Schmitt. An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication. [presentation] [report]
- Filip Müllers. Secure biometric authentication with improved accuracy. [presentation][report]
- 07.12.2009
- Vanessa End. Secure Remote Authentication Using Biometric Data. [presentation][report]
- Jonathan P. Chapman. Determining the Security Enhancement of Biometry in Passports. [presentation][report]
- 14.12.2009
- Marko Pascan. Fingerprint-based Fuzzy Vault: Implementation and Performance. [presentation][report]
- Bastian Fischer. The Fuzzy Vault for fingerprints is Vulnerable to Brute Force Attack. [presentation][report]
- 11.01.2010
- Andreas Meisenheimer. Multi-factor Authenticated Key Exchange. [presentation][report]
- Andreas Keller. Key Agreement from Close Secrets over Unsecured Channels. [presentation][report]
- Andreas Meisenheimer. Multi-factor Authenticated Key Exchange. [presentation][report]
- 18.01.2010
- Nina Keller. A Biometric Identity Based Signature Scheme.[presentation][report]
- Kittipat Virochsiri. Fuzzy Identity Based Signature. [presentation][report]
- 25.01.2010
- Guido Simon. Fuzzy Identity-Based Encryption. [presentation][report]
Contents
These are the possible topics of the talks (Asterisks indicate advanced topics). Students are also welcome to propose their own topics.
- Fuzzy extractors
-
(*) Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer (2004)
-
Reusable Cryptographic Fuzzy Extractors. Xavier Boyen Cryptology ePrint Archive: Report 2004/358
-
Julien Bringer and Hervé Chabanne and Quoc Dung Do. A Fuzzy Sketch with Trapdoor, Cryptology ePrint Archive: Report 2005/331
-
Bhavana Kanukurthi and Leonid Reyzin. An Improved Robust Fuzzy Extractor. Cryptology ePrint Archive: Report 2008/278
-
- Fuzzy Vault
-
Ari Juels and Madhu Sudan. A Fuzzy Vault Scheme. Cryptology ePrint Archive: Report 2002/093
-
Karthik Nandakumar, Student Member, IEEE, Anil K. Jain, Fellow, IEEE and Sharath Pankanti, Senior Member, IEEE. Fingerprint-based Fuzzy Vault: Implementation and Performance.
-
Preda Mihailescu: The Fuzzy Vault for fingerprints is Vulnerable to Brute Force Attack CoRR abs/0708.2974: (2007)
-
-
Secure Biometric Authentication
-
Atallah, M.J., Frikken, K.B., Goodrich, M.T., Tamassia, R.. Secure biometric authentication for weak computational devices. In Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 357–371. Springer (2005)
-
J. Bringer, H. Chabanne, M. Izabachene, D. Pointcheval, Q. Tang, and S. Zimmer. An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. In J. Pieprzyk, H. Ghodosi, and E. Dawson, editors, ACISP’07, volume 4586 of LNCS, pages 96–106. Springer, 2007
-
J. Bringer, H. Chabanne, D. Pointcheval, and Q. Tang. Extended Private Information Retrieval and Its Application in Biometrics Authentications. In F. Bao, S. Ling, T. Okamoto, H. Wang, and C. Xing, editors, CANS’07, volume 4856 of LNCS, pages 175–193. Springer, 2007.
-
J. Bringer and H. Chabanne. An Authentication Protocol with Encrypted Biometric Data. In S. Vaudenay, editor, AFRICACRYPT’08, volume 5023 of LNCS, pages 109–124. Springer, 2008.
-
Andrew Burnett and Adam Duffy and Tom Dowling. A Biometric Identity Based Signature Scheme. Cryptology ePrint Archive: Report 2004/176
-
Q. Tang, J. Bringer, H. Chabanne, and D. Pointcheval. A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. In L. Chen, Y. Mu, and W. Susilo, editors, ISPEC’08, volume 4991 of LNCS, pages 56–70. Springer, 2008.
-
Julien Bringer, Hervé Chabanne, David Pointcheval, Sébastien Zimmer. An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication. IWSEC 2008: 219-230
-
Barbosa, M., Brouard, T., Cauchie, S., de Sousa, S.M.: Secure biometric authentication with improved accuracy. In Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 21–36. Springer (2008)
-
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, and Adam Smith, Secure Remote Authentication Using Biometric Data, in Advances in Cryptology EUROCRYPT '05, 2005.
-
-
Biometric Key Exchange
-
David Pointcheval, Sébastien Zimmer: Multi-factor Authenticated Key Exchange. ACNS 2008: 277-295
-
Bhavana Kanukurthi and Leonid Reyzin. Key Agreement from Close Secrets over Unsecured Channels. Cryptology ePrint Archive: Report 2008/494
-
-
Biometric Encryption/Signature
-
Amit Sahai, Brent Waters. Fuzzy Identity-Based Encryption. EUROCRYPT 2005:457-473
-
Joonsang Baek, Willy Susilo, Jianying Zhou. New constructions of fuzzy identity-based encryption. ASIACCS 2007:368-370
-
Andrew Burnett and Adam Duffy and Tom Dowling. A Biometric Identity Based Signature Scheme. Cryptology ePrint Archive: Report 2004/176
-
Piyi Yang and Zhenfu Cao and Xiaolei Dong. Fuzzy Identity Based Signature. Cryptology ePrint Archive: Report 2008/002
-
Siamak F Shahandashti and Reihaneh Safavi-Naini. Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. Cryptology ePrint Archive: Report 2009/126
-