{"title":"Biometric Systems with Multiuser Access Structures","authors":"Rémi A. Chou","doi":"10.1109/ISIT.2019.8849439","DOIUrl":null,"url":null,"abstract":"We propose a model for biometric systems with a multiuser access structure, where after enrollment only predefined authorized sets of participants are allowed to access the system upon presenting their biometrics. Two types of system design are considered for the enrollment. In the first one, the participants must simultaneously present their biometrics to enroll in the system. In the second one, each participant can individually enroll in the system, which is more convenient for systems with a large number of participants. For these two types of enrollment and the presence of a multiuser access structure, the fundamental trade-off between security and privacy leakage is studied.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"24 1","pages":"807-811"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Symposium on Information Theory (ISIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT.2019.8849439","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
We propose a model for biometric systems with a multiuser access structure, where after enrollment only predefined authorized sets of participants are allowed to access the system upon presenting their biometrics. Two types of system design are considered for the enrollment. In the first one, the participants must simultaneously present their biometrics to enroll in the system. In the second one, each participant can individually enroll in the system, which is more convenient for systems with a large number of participants. For these two types of enrollment and the presence of a multiuser access structure, the fundamental trade-off between security and privacy leakage is studied.