{"title":"迈向“无收据”的远程生物识别认证","authors":"Yoshifumi Ueshige, K. Sakurai","doi":"10.1109/EST.2014.22","DOIUrl":null,"url":null,"abstract":"Recently, cancelable biometrics, zero-bio, PKI with biometrics, and some related methods have been proposed as remote biometrics. These proposals are discussed in the viewpoint of not forensics but privacy protection. When forensic techniques are abused on the remote biometric authentication systems by third person, he/she can collect information of authentication process, such as stored templates, intermediate calculated data and etc. This situation causes novel privacy issues about excessive collection of information. Therefore, we define 'greceipt-freeness'h of biometric authentication protocol, from the viewpoint of anti-forensics. As a first step for considering requirements for 'greceipt-freeness'h remote biometric protocols, some related works are analyzed about characteristic of 'greceipt-freeness.'h As a result, we show the all protocols do not satisfy 'greceipt-freeness'h except a few situations since the servers of these protocols remain some evidence such as transformed biometric data.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Towards 'Receipt-Freeness' in Remote Biometric Authentication\",\"authors\":\"Yoshifumi Ueshige, K. Sakurai\",\"doi\":\"10.1109/EST.2014.22\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, cancelable biometrics, zero-bio, PKI with biometrics, and some related methods have been proposed as remote biometrics. These proposals are discussed in the viewpoint of not forensics but privacy protection. When forensic techniques are abused on the remote biometric authentication systems by third person, he/she can collect information of authentication process, such as stored templates, intermediate calculated data and etc. This situation causes novel privacy issues about excessive collection of information. Therefore, we define 'greceipt-freeness'h of biometric authentication protocol, from the viewpoint of anti-forensics. As a first step for considering requirements for 'greceipt-freeness'h remote biometric protocols, some related works are analyzed about characteristic of 'greceipt-freeness.'h As a result, we show the all protocols do not satisfy 'greceipt-freeness'h except a few situations since the servers of these protocols remain some evidence such as transformed biometric data.\",\"PeriodicalId\":193536,\"journal\":{\"name\":\"2014 Fifth International Conference on Emerging Security Technologies\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Fifth International Conference on Emerging Security Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EST.2014.22\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Fifth International Conference on Emerging Security Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EST.2014.22","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards 'Receipt-Freeness' in Remote Biometric Authentication
Recently, cancelable biometrics, zero-bio, PKI with biometrics, and some related methods have been proposed as remote biometrics. These proposals are discussed in the viewpoint of not forensics but privacy protection. When forensic techniques are abused on the remote biometric authentication systems by third person, he/she can collect information of authentication process, such as stored templates, intermediate calculated data and etc. This situation causes novel privacy issues about excessive collection of information. Therefore, we define 'greceipt-freeness'h of biometric authentication protocol, from the viewpoint of anti-forensics. As a first step for considering requirements for 'greceipt-freeness'h remote biometric protocols, some related works are analyzed about characteristic of 'greceipt-freeness.'h As a result, we show the all protocols do not satisfy 'greceipt-freeness'h except a few situations since the servers of these protocols remain some evidence such as transformed biometric data.