Biometric Transaction Authentication Protocol: Formal Model Verification and “Four-Eyes” Principle Extension View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2012

AUTHORS

Daniel Hartung , Christoph Busch

ABSTRACT

The BTA protocol for biometric authentication of online banking transactions is extended to allow for multiple person authenticated transactions. In addition a formal specification is given, the protocol is modelled in the applied pi calculus and the security properties of data and person authentication as well as non-repudiation are verified using the tool ProVerif. More... »

PAGES

88-103

References to SciGraph publications

  • 2001-07-13. MDx-MAC and Building Fast MACs from Hash Functions in ADVANCES IN CRYPTOLOGY — CRYPT0’ 95
  • 2004. Capacity and Examples of Template-Protecting Biometric Authentication Systems in BIOMETRIC AUTHENTICATION
  • Book

    TITLE

    Financial Cryptography and Data Security

    ISBN

    978-3-642-29888-2
    978-3-642-29889-9

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-642-29889-9_8

    DOI

    http://dx.doi.org/10.1007/978-3-642-29889-9_8

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1046395622


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Artificial Intelligence and Image Processing", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Norwegian University of Science and Technology", 
              "id": "https://www.grid.ac/institutes/grid.5947.f", 
              "name": [
                "Norwegian Information Security laboratory, Faculty for Computer Science and Media Technology, Gj\u00f8vik University College, Teknologivn. 22, N-2802\u00a0Gj\u00f8vik, Norway"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Hartung", 
            "givenName": "Daniel", 
            "id": "sg:person.07407741575.61", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07407741575.61"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Norwegian University of Science and Technology", 
              "id": "https://www.grid.ac/institutes/grid.5947.f", 
              "name": [
                "Norwegian Information Security laboratory, Faculty for Computer Science and Media Technology, Gj\u00f8vik University College, Teknologivn. 22, N-2802\u00a0Gj\u00f8vik, Norway"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Busch", 
            "givenName": "Christoph", 
            "id": "sg:person.011143356603.69", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011143356603.69"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/3-540-44750-4_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1026318663", 
              "https://doi.org/10.1007/3-540-44750-4_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44750-4_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1026318663", 
              "https://doi.org/10.1007/3-540-44750-4_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-25976-3_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035408784", 
              "https://doi.org/10.1007/978-3-540-25976-3_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-25976-3_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035408784", 
              "https://doi.org/10.1007/978-3-540-25976-3_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/0890-5401(92)90008-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045157295"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/266420.266432", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046763518"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/sfcs.1981.32", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1086205701"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/sfcs.1996.548510", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093802039"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/securware.2010.41", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094580801"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/csfw.2001.930138", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094999511"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/csfw.2001.930138", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094999511"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2012", 
        "datePublishedReg": "2012-01-01", 
        "description": "The BTA protocol for biometric authentication of online banking transactions is extended to allow for multiple person authenticated transactions. In addition a formal specification is given, the protocol is modelled in the applied pi calculus and the security properties of data and person authentication as well as non-repudiation are verified using the tool ProVerif.", 
        "editor": [
          {
            "familyName": "Danezis", 
            "givenName": "George", 
            "type": "Person"
          }, 
          {
            "familyName": "Dietrich", 
            "givenName": "Sven", 
            "type": "Person"
          }, 
          {
            "familyName": "Sako", 
            "givenName": "Kazue", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-642-29889-9_8", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-642-29888-2", 
            "978-3-642-29889-9"
          ], 
          "name": "Financial Cryptography and Data Security", 
          "type": "Book"
        }, 
        "name": "Biometric Transaction Authentication Protocol: Formal Model Verification and \u201cFour-Eyes\u201d Principle Extension", 
        "pagination": "88-103", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-642-29889-9_8"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "dd01e89d4d5278ed9276d1ee58e71c7625e0fb34c217a8050c66e98bf2b0fd2b"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1046395622"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-642-29889-9_8", 
          "https://app.dimensions.ai/details/publication/pub.1046395622"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T22:01", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8693_00000272.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-642-29889-9_8"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-29889-9_8'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-29889-9_8'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-29889-9_8'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-29889-9_8'


     

    This table displays all metadata directly associated to this object as RDF triples.

    108 TRIPLES      23 PREDICATES      35 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-642-29889-9_8 schema:about anzsrc-for:08
    2 anzsrc-for:0801
    3 schema:author N007531ba32dd4069ac09442f64ad2dfa
    4 schema:citation sg:pub.10.1007/3-540-44750-4_1
    5 sg:pub.10.1007/978-3-540-25976-3_15
    6 https://doi.org/10.1016/0890-5401(92)90008-4
    7 https://doi.org/10.1109/csfw.2001.930138
    8 https://doi.org/10.1109/securware.2010.41
    9 https://doi.org/10.1109/sfcs.1981.32
    10 https://doi.org/10.1109/sfcs.1996.548510
    11 https://doi.org/10.1145/266420.266432
    12 schema:datePublished 2012
    13 schema:datePublishedReg 2012-01-01
    14 schema:description The BTA protocol for biometric authentication of online banking transactions is extended to allow for multiple person authenticated transactions. In addition a formal specification is given, the protocol is modelled in the applied pi calculus and the security properties of data and person authentication as well as non-repudiation are verified using the tool ProVerif.
    15 schema:editor Ne4cd3e3b0f4a43c7bc3f3fed2dae24e3
    16 schema:genre chapter
    17 schema:inLanguage en
    18 schema:isAccessibleForFree false
    19 schema:isPartOf N99aa57b1d1d748aa89d599f4a88a2545
    20 schema:name Biometric Transaction Authentication Protocol: Formal Model Verification and “Four-Eyes” Principle Extension
    21 schema:pagination 88-103
    22 schema:productId N3cfdb2d151974081833c4c27028d2dc4
    23 Nb9e6ae74b2764ce1af72233b89d638f7
    24 Ndc3b742192d148a2a8aa039a91fba960
    25 schema:publisher N6502100f26ff4b338b0e3dfeb958ee4c
    26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046395622
    27 https://doi.org/10.1007/978-3-642-29889-9_8
    28 schema:sdDatePublished 2019-04-15T22:01
    29 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    30 schema:sdPublisher Ncd867441dc7a47f8bf462ac2559d90b7
    31 schema:url http://link.springer.com/10.1007/978-3-642-29889-9_8
    32 sgo:license sg:explorer/license/
    33 sgo:sdDataset chapters
    34 rdf:type schema:Chapter
    35 N007531ba32dd4069ac09442f64ad2dfa rdf:first sg:person.07407741575.61
    36 rdf:rest N66e64d23d4b446bb8e3f849e1f23175a
    37 N3cfdb2d151974081833c4c27028d2dc4 schema:name doi
    38 schema:value 10.1007/978-3-642-29889-9_8
    39 rdf:type schema:PropertyValue
    40 N4634df2928c84e779bfdec1f3335c075 rdf:first N686684e2f5ab4e0dbab8cf533d006051
    41 rdf:rest rdf:nil
    42 N6502100f26ff4b338b0e3dfeb958ee4c schema:location Berlin, Heidelberg
    43 schema:name Springer Berlin Heidelberg
    44 rdf:type schema:Organisation
    45 N66e64d23d4b446bb8e3f849e1f23175a rdf:first sg:person.011143356603.69
    46 rdf:rest rdf:nil
    47 N686684e2f5ab4e0dbab8cf533d006051 schema:familyName Sako
    48 schema:givenName Kazue
    49 rdf:type schema:Person
    50 N99aa57b1d1d748aa89d599f4a88a2545 schema:isbn 978-3-642-29888-2
    51 978-3-642-29889-9
    52 schema:name Financial Cryptography and Data Security
    53 rdf:type schema:Book
    54 Na83fe99728f8496cb64b8906798306fd schema:familyName Dietrich
    55 schema:givenName Sven
    56 rdf:type schema:Person
    57 Nb9e6ae74b2764ce1af72233b89d638f7 schema:name readcube_id
    58 schema:value dd01e89d4d5278ed9276d1ee58e71c7625e0fb34c217a8050c66e98bf2b0fd2b
    59 rdf:type schema:PropertyValue
    60 Ncbf86b26ca1f4b68896d45d3d7b7081d schema:familyName Danezis
    61 schema:givenName George
    62 rdf:type schema:Person
    63 Ncd867441dc7a47f8bf462ac2559d90b7 schema:name Springer Nature - SN SciGraph project
    64 rdf:type schema:Organization
    65 Ndc3b742192d148a2a8aa039a91fba960 schema:name dimensions_id
    66 schema:value pub.1046395622
    67 rdf:type schema:PropertyValue
    68 Ne4cd3e3b0f4a43c7bc3f3fed2dae24e3 rdf:first Ncbf86b26ca1f4b68896d45d3d7b7081d
    69 rdf:rest Ne8313e89f428439485c757434ae45a66
    70 Ne8313e89f428439485c757434ae45a66 rdf:first Na83fe99728f8496cb64b8906798306fd
    71 rdf:rest N4634df2928c84e779bfdec1f3335c075
    72 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    73 schema:name Information and Computing Sciences
    74 rdf:type schema:DefinedTerm
    75 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
    76 schema:name Artificial Intelligence and Image Processing
    77 rdf:type schema:DefinedTerm
    78 sg:person.011143356603.69 schema:affiliation https://www.grid.ac/institutes/grid.5947.f
    79 schema:familyName Busch
    80 schema:givenName Christoph
    81 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011143356603.69
    82 rdf:type schema:Person
    83 sg:person.07407741575.61 schema:affiliation https://www.grid.ac/institutes/grid.5947.f
    84 schema:familyName Hartung
    85 schema:givenName Daniel
    86 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07407741575.61
    87 rdf:type schema:Person
    88 sg:pub.10.1007/3-540-44750-4_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026318663
    89 https://doi.org/10.1007/3-540-44750-4_1
    90 rdf:type schema:CreativeWork
    91 sg:pub.10.1007/978-3-540-25976-3_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035408784
    92 https://doi.org/10.1007/978-3-540-25976-3_15
    93 rdf:type schema:CreativeWork
    94 https://doi.org/10.1016/0890-5401(92)90008-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045157295
    95 rdf:type schema:CreativeWork
    96 https://doi.org/10.1109/csfw.2001.930138 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094999511
    97 rdf:type schema:CreativeWork
    98 https://doi.org/10.1109/securware.2010.41 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094580801
    99 rdf:type schema:CreativeWork
    100 https://doi.org/10.1109/sfcs.1981.32 schema:sameAs https://app.dimensions.ai/details/publication/pub.1086205701
    101 rdf:type schema:CreativeWork
    102 https://doi.org/10.1109/sfcs.1996.548510 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093802039
    103 rdf:type schema:CreativeWork
    104 https://doi.org/10.1145/266420.266432 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046763518
    105 rdf:type schema:CreativeWork
    106 https://www.grid.ac/institutes/grid.5947.f schema:alternateName Norwegian University of Science and Technology
    107 schema:name Norwegian Information Security laboratory, Faculty for Computer Science and Media Technology, Gjøvik University College, Teknologivn. 22, N-2802 Gjøvik, Norway
    108 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...