Secure authentication from facial attributeswith no privacy loss.
Orr DunkelmanMargarita OsadchyMahmood SharifPublished in: CCS (2013)
Keyphrases
- identity management
- authentication protocol
- security mechanisms
- electronic payment
- security issues
- security services
- trusted third party
- mutual authentication
- security analysis
- authentication mechanism
- security requirements
- personal information
- password authentication
- user authentication
- access control
- cloud computing
- authentication scheme
- smart card
- face recognition
- user privacy
- facial expressions
- data encryption
- factor authentication
- electronic commerce
- integrity verification
- facial images
- digital signature
- key distribution
- human faces
- resource constrained
- privacy protection
- security properties
- face images
- facial features
- privacy preserving
- security protocols
- security measures
- rfid systems
- rfid tags
- information loss
- third party
- sensitive data
- key management
- data sharing
- secure multiparty computation
- public key
- secure manner
- data confidentiality
- cryptographic protocols
- image authentication
- secret key
- biometric template
- encryption decryption
- public key infrastructure
- data security
- public key cryptography
- trust relationships