DOI QR코드

DOI QR Code

The Biometric Signature Delegation Method with Undeniable Property

부인봉쇄 성질을 갖는 바이오메트릭 서명 위임 기법

  • Yun, Sunghyun (Div. of Information & Communication Engineering, Baekseok University)
  • 윤성현 (백석대학교 정보통신학부)
  • Received : 2013.12.03
  • Accepted : 2014.01.20
  • Published : 2014.01.28

Abstract

In a biometric signature scheme, a user's biometric key is used to sign the document. It also requires the user be authenticated with biometric recognition method, prior to signing the document. Because the biometric recognition is launched every time the signature session started, it is not suitable for electronic commerce applications such as shopping malls where large number of documents to sign are required. Therefore, to commercialize biometric based signature schemes, the new proxy signature scheme is needed to ease the burden of the signer. In the proxy signature scheme, the signer can delegate signing activities to trustful third parties. In this study, the biometric based signature delegation method is proposed. The proposed scheme is suitable for applications where a lot of signing are required. It is consisted of biometric key generation, PKI based mutual authentication, signature generation and verification protocols.

바이오메트릭 서명은 서명자의 바이로메트릭 키를 이용하여 서명하는 것으로 서명자는 서명에 앞서 본인임을 인증하는 과정이 필요하다. 바이오메트릭 인증은 매 서명 세션마다 이루어지기 때문에 전자상거래 쇼핑몰과 같이 대규모 서명이 요구되는 응용에는 적합하지 않다. 따라서 바이오메트릭 서명 기법의 실용화를 위해서는 신뢰할 수 있는 제 3자에게 서명 위임을 하여, 서명자의 업무량을 줄일 수 있는 기법이 필요하다. 본 연구에서는 대규모 서명에 적합한 바이오 서명 임대 기법을 제안한다. 제안한 서명 임대 기법은 바이오메트릭 키 생성, PKI 기반의 상호 인증, 서명 생성 및 검증 프로토콜로 구성된다.

Keywords

References

  1. Haizhou Li, Kar-Ann Toh, Liyuan Li, Advanced Topics in Biometrics, World Scientific, 2011.
  2. J. Tepandi, I. Tsahhirov and S. Vassiljev, "Wireless PKI Security and Mobile Voting," IEEE Computer, vol. 43, no. 6, pp. 54-60, June, 2010.
  3. C. Vivaracho-Pascual, J. Pascual-Gaspar, "On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services," IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp. 1-10, 2011.
  4. Want, "iPhone: Smarter Than the Average Phone," IEEE Pervasive Computing, Vol. 9, No. 3, pp. 6-9, 2010.
  5. N. Ratha, J. Connell, R. Bolle, "Enhancing security and privacy in biometric-based authentication systems," IBM Systems Journal, Vol. 40, No. 3, pp. 614-634, 2001. https://doi.org/10.1147/sj.403.0614
  6. D. Evans and N. Paul, "Election Security: Perception and reality," IEEE Security & Privacy, vol. 2, no. 1, pp. 24-31, Jan. 2004. https://doi.org/10.1109/MSECP.2004.1264850
  7. ITU-T X.1088, A Framework for biometric digital key generation, ITU-T, 2008.
  8. T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, IT-31(4), pp. 469-472, 1985.
  9. P. Janbandhu and M. Siyal, "Novel biometric digital signatures for Internet-based applications," Information Management & Computer Security, Vol. 9, No. 5, pp. 205-212, 2001. https://doi.org/10.1108/09685220110408022
  10. P. Orvos, "Towards biometric digital signatures," Networkshop, Eszterhazy College, Eger, pp. 26-28, 2002.

Cited by

  1. 2-Channel authentication technique using cardiac impulse based OTP vol.12, pp.3, 2016, https://doi.org/10.1007/s11416-016-0271-5