remote biometrics authentication

Privacy-preserving similarity evaluation and application to remote biometrics authentication

FREE-DOWNLOAD H Kikuchi, K Nagai, W Ogata… – Soft Computing-A Fusion of …, 2010
Abstract In this paper, a new method for secure remote biometric authentication preventing the
vulnerability of compromised biometrics is presented. The idea is based on a public-key cryptographical
protocol, referred as zero- knowledge proof, which allows a user to prove that she has