Please use this identifier to cite or link to this item:
http://hdl.handle.net/10609/8754
Title: | Visualizing key authenticity: turning your face into your public key |
Author: | Arnedo-Moreno, Joan ![]() Lapedriza, Agata ![]() |
Citation: | Arnedo, J.;Lapedriza, À.. (2010). "Visualizing key authenticity: turning your face into your public key". A:.Proceedings of the 6th China International Conference on Information Security and Cryptology (Inscrypt 2010).Shanghai.IEEE Press . Pág. 605 - 618. |
Abstract: | Biometric information has become a technology complementary to cryptography, allowing to conveniently manage cryptographic data. Two important needs are ful lled: rst of all, making such data always readily available, and additionally, making its legitimate owner easily identi able. In this work we propose a signature system which integrates face recognition biometrics with and identity-based signature scheme, so the user's face e ectively becomes his public key and system ID. Thus, other users may verify messages using photos of the claimed sender, providing a reasonable trade-o between system security and usability, as well as a much more straightforward public key authenticity and distribution process. |
Keywords: | Authentication image processing |
Document type: | info:eu-repo/semantics/bookPart |
Issue Date: | 20-Oct-2010 |
Publication license: | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ ![]() |
Appears in Collections: | Capítols o parts de llibres |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2010_Inscrypt.pdf | 321,06 kB | Adobe PDF | ![]() View/Open |
Share:


This item is licensed under a Creative Commons License