Browse > Article
http://dx.doi.org/10.14400/JDPM.2014.12.1.389

The Biometric Signature Delegation Method with Undeniable Property  

Yun, Sunghyun (Div. of Information & Communication Engineering, Baekseok University)
Publication Information
Journal of Digital Convergence / v.12, no.1, 2014 , pp. 389-395 More about this Journal
Abstract
In a biometric signature scheme, a user's biometric key is used to sign the document. It also requires the user be authenticated with biometric recognition method, prior to signing the document. Because the biometric recognition is launched every time the signature session started, it is not suitable for electronic commerce applications such as shopping malls where large number of documents to sign are required. Therefore, to commercialize biometric based signature schemes, the new proxy signature scheme is needed to ease the burden of the signer. In the proxy signature scheme, the signer can delegate signing activities to trustful third parties. In this study, the biometric based signature delegation method is proposed. The proposed scheme is suitable for applications where a lot of signing are required. It is consisted of biometric key generation, PKI based mutual authentication, signature generation and verification protocols.
Keywords
Biometric Signature; Proxy Signature; PKI; Undeniable Property; Large Scale Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Haizhou Li, Kar-Ann Toh, Liyuan Li, Advanced Topics in Biometrics, World Scientific, 2011.
2 J. Tepandi, I. Tsahhirov and S. Vassiljev, "Wireless PKI Security and Mobile Voting," IEEE Computer, vol. 43, no. 6, pp. 54-60, June, 2010.
3 C. Vivaracho-Pascual, J. Pascual-Gaspar, "On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services," IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp. 1-10, 2011.
4 Want, "iPhone: Smarter Than the Average Phone," IEEE Pervasive Computing, Vol. 9, No. 3, pp. 6-9, 2010.
5 N. Ratha, J. Connell, R. Bolle, "Enhancing security and privacy in biometric-based authentication systems," IBM Systems Journal, Vol. 40, No. 3, pp. 614-634, 2001.   DOI   ScienceOn
6 D. Evans and N. Paul, "Election Security: Perception and reality," IEEE Security & Privacy, vol. 2, no. 1, pp. 24-31, Jan. 2004.   DOI   ScienceOn
7 ITU-T X.1088, A Framework for biometric digital key generation, ITU-T, 2008.
8 T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, IT-31(4), pp. 469-472, 1985.
9 P. Janbandhu and M. Siyal, "Novel biometric digital signatures for Internet-based applications," Information Management & Computer Security, Vol. 9, No. 5, pp. 205-212, 2001.   DOI   ScienceOn
10 P. Orvos, "Towards biometric digital signatures," Networkshop, Eszterhazy College, Eger, pp. 26-28, 2002.