This paper aims to provide a remote fingerprint object authentication protocol dedicated to anti-counterfeiting
applications. The corresponding security model is given. The suggested scheme is based on an Elliptic Curve
Cryptography (ECC) encryption adding a mechanism to control integrity at the verification stage. The
privacy constraint useful in many applications leads us to embed a Private Information Retrieval scheme in
the protocol.
As in a previous SPIE presentation, we begin with an optical reader. We drastically lower the amount of
computation made at this stage.
This paper follows a paper by Bringer et al.3 to adapt a security model and protocol used for remote biometric
authentication to the case of remote morphometric object authentication. We use a different type of encryption
technique that requires smaller key sizes and has a built-in mechanism to help control the integrity of the messages
received by the server. We also describe the optical technology used to extract the morphometric templates.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.