Identification, trust and privacy: how biometrics can aid certification of digital signatures

Michael Bromby

Research output: Contribution to journalArticle

Abstract

Public key infrastructure (PKI) enables the secure and private exchange of data using an unsecure public network, such as the Internet. The use of paired private and public keys, issued by a trusted third-party authority, enables documents to be transferred securely and for the sender to be authenticated. The use of biometrics offers the potential to enhance considerably the PKI model in restricting the use of your private key for encryption and decryption. The use of a fingerprint, for example, can provide a higher level of confidence than the traditional password/PIN model. This provides the additional level of individual or personal authentification should a group of people have access to one key. The authentification of data, or a document, is often physically remote from the owner, especially for Internet-based communications. Conversely, traditional biometric usage has been to identity the physical presence of a person, for example for secure entry, or the receipt of information, or the receipt of goods.

Original languageEnglish
Pages (from-to)133-141
Number of pages9
JournalInternational Review of Law, Computers and Technology
Volume24
Issue number1
Publication statusPublished - 1 Mar 2010

Fingerprint

Electronic document identification systems
Biometrics
certification
privacy
Internet
infrastructure
Cryptography
communications
confidence
human being
Communication
Group
biometrics

Keywords

  • fingerprint
  • electronic signature
  • identity

Cite this

@article{3c3f9cc7ad2449e2a16601559f5ef341,
title = "Identification, trust and privacy: how biometrics can aid certification of digital signatures",
abstract = "Public key infrastructure (PKI) enables the secure and private exchange of data using an unsecure public network, such as the Internet. The use of paired private and public keys, issued by a trusted third-party authority, enables documents to be transferred securely and for the sender to be authenticated. The use of biometrics offers the potential to enhance considerably the PKI model in restricting the use of your private key for encryption and decryption. The use of a fingerprint, for example, can provide a higher level of confidence than the traditional password/PIN model. This provides the additional level of individual or personal authentification should a group of people have access to one key. The authentification of data, or a document, is often physically remote from the owner, especially for Internet-based communications. Conversely, traditional biometric usage has been to identity the physical presence of a person, for example for secure entry, or the receipt of information, or the receipt of goods.",
keywords = "fingerprint, electronic signature, identity",
author = "Michael Bromby",
note = "Originally published in: International Review of Law, Computers and Technology (2010), 24 (1), pp.133-141.",
year = "2010",
month = "3",
day = "1",
language = "English",
volume = "24",
pages = "133--141",
journal = "International Review of Law, Computers and Technology",
issn = "1360-0869",
publisher = "Taylor & Francis Group",
number = "1",

}

Identification, trust and privacy: how biometrics can aid certification of digital signatures. / Bromby, Michael.

In: International Review of Law, Computers and Technology, Vol. 24, No. 1, 01.03.2010, p. 133-141.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Identification, trust and privacy: how biometrics can aid certification of digital signatures

AU - Bromby, Michael

N1 - Originally published in: International Review of Law, Computers and Technology (2010), 24 (1), pp.133-141.

PY - 2010/3/1

Y1 - 2010/3/1

N2 - Public key infrastructure (PKI) enables the secure and private exchange of data using an unsecure public network, such as the Internet. The use of paired private and public keys, issued by a trusted third-party authority, enables documents to be transferred securely and for the sender to be authenticated. The use of biometrics offers the potential to enhance considerably the PKI model in restricting the use of your private key for encryption and decryption. The use of a fingerprint, for example, can provide a higher level of confidence than the traditional password/PIN model. This provides the additional level of individual or personal authentification should a group of people have access to one key. The authentification of data, or a document, is often physically remote from the owner, especially for Internet-based communications. Conversely, traditional biometric usage has been to identity the physical presence of a person, for example for secure entry, or the receipt of information, or the receipt of goods.

AB - Public key infrastructure (PKI) enables the secure and private exchange of data using an unsecure public network, such as the Internet. The use of paired private and public keys, issued by a trusted third-party authority, enables documents to be transferred securely and for the sender to be authenticated. The use of biometrics offers the potential to enhance considerably the PKI model in restricting the use of your private key for encryption and decryption. The use of a fingerprint, for example, can provide a higher level of confidence than the traditional password/PIN model. This provides the additional level of individual or personal authentification should a group of people have access to one key. The authentification of data, or a document, is often physically remote from the owner, especially for Internet-based communications. Conversely, traditional biometric usage has been to identity the physical presence of a person, for example for secure entry, or the receipt of information, or the receipt of goods.

KW - fingerprint

KW - electronic signature

KW - identity

M3 - Article

VL - 24

SP - 133

EP - 141

JO - International Review of Law, Computers and Technology

JF - International Review of Law, Computers and Technology

SN - 1360-0869

IS - 1

ER -