{"title":"ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol","authors":"Kei Nagai, H. Kikuchi, W. Ogata, M. Nishigaki","doi":"10.1109/ARES.2007.162","DOIUrl":null,"url":null,"abstract":"We propose a cryptographic protocol for biometrics authentication without revealing personal biometrical data against malicious verifier. Our protocol uses a neural network and zero-knowledge interactive proof. In this paper, we developed a sample implementation system of our proposed protocol and we evaluate the performance and the accuracy of the proposed protocol. Especially, we study several algorithms for feature extraction of minutiae of fingerprint which is appropriate to our protocol. We examine false acceptance rates and rejection rates","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Second International Conference on Availability, Reliability and Security (ARES'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2007.162","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
We propose a cryptographic protocol for biometrics authentication without revealing personal biometrical data against malicious verifier. Our protocol uses a neural network and zero-knowledge interactive proof. In this paper, we developed a sample implementation system of our proposed protocol and we evaluate the performance and the accuracy of the proposed protocol. Especially, we study several algorithms for feature extraction of minutiae of fingerprint which is appropriate to our protocol. We examine false acceptance rates and rejection rates