Sommaire

  • Cet exposé a été présenté le 16 mars 2007.

Description

  • Orateur

    Julien Bringer - Sagem

This work deals with the security problems in authentication schemes employing volatile biometric features, where the authentication is indeed a comparison between a fresh feature and that enrolled during the initialization phase. We propose a security model for biometric-based authentication schemes by assuming that the biometric features to be public. Extra attentions have been paid to the privacy issues related to the sensitive relation between a biometric feature and the relevant identity. To formally study the security issues in biometric information comparison, we introduce a new cryptographic primitive, i.e., Decisional Private Information Retrieval (DPIR), inspired by the concept of Private Information Retrieval (PIR). DPIR protocols enable a client to obtain some information about an item from a database without retrieving this item directly. One DPIR protocol is constructed using Paillier's public key encryption scheme and the ElGamal scheme. Finally, we present an authentication scheme based on this DPIR protocol, proved secure in our security model.<br/> Cet exposé est basé sur des travaux communs avec Hervé Chabanne (Sagem Défense Sécurité), Malika Izabachéne, David Pointcheval, Qiang Tang, et Sébastien Zimmer (ENS).

Prochains exposés

  • Journées C2: pas de séminaire

    • 03 avril 2026 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

  • Endomorphisms via Splittings

    • 10 avril 2026 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Min-Yi Shen - No Affiliation

    One of the fundamental hardness assumptions underlying isogeny-based cryptography is the problem of finding a non-trivial endomorphism of a given supersingular elliptic curve. In this talk, we show that the problem is related to the problem of finding a splitting of a principally polarised superspecial abelian surface. In particular, we provide formal security reductions and a proof-of-concept[…]
    • Cryptography

Voir les exposés passés