{"id":"https://openalex.org/W4406728473","doi":"https://doi.org/10.1109/bcca62388.2024.10844381","title":"Secure Blockchain based Biometric Authentication using Elliptic Curve Digital Signature Algorithm","display_name":"Secure Blockchain based Biometric Authentication using Elliptic Curve Digital Signature Algorithm","publication_year":2024,"publication_date":"2024-11-26","ids":{"openalex":"https://openalex.org/W4406728473","doi":"https://doi.org/10.1109/bcca62388.2024.10844381"},"language":"en","primary_location":{"id":"doi:10.1109/bcca62388.2024.10844381","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bcca62388.2024.10844381","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 6th International Conference on Blockchain Computing and Applications (BCCA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100649418","display_name":"Surbhi Sharma","orcid":"https://orcid.org/0000-0002-8079-9486"},"institutions":[{"id":"https://openalex.org/I36090812","display_name":"Netaji Subhas University of Technology","ror":"https://ror.org/01fczmh85","country_code":"IN","type":"education","lineage":["https://openalex.org/I36090812"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Surbhi Sharma","raw_affiliation_strings":["Netaji Subhas University of Technology (formerly NSIT),Department of Computer Science and Engineering,New Delhi,India"],"affiliations":[{"raw_affiliation_string":"Netaji Subhas University of Technology (formerly NSIT),Department of Computer Science and Engineering,New Delhi,India","institution_ids":["https://openalex.org/I36090812"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008487159","display_name":"Rudresh Dwivedi","orcid":"https://orcid.org/0000-0001-7836-2683"},"institutions":[{"id":"https://openalex.org/I36090812","display_name":"Netaji Subhas University of Technology","ror":"https://ror.org/01fczmh85","country_code":"IN","type":"education","lineage":["https://openalex.org/I36090812"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rudresh Dwivedi","raw_affiliation_strings":["Netaji Subhas University of Technology (formerly NSIT),Department of Computer Science and Engineering,New Delhi,India"],"affiliations":[{"raw_affiliation_string":"Netaji Subhas University of Technology (formerly NSIT),Department of Computer Science and Engineering,New Delhi,India","institution_ids":["https://openalex.org/I36090812"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100649418"],"corresponding_institution_ids":["https://openalex.org/I36090812"],"apc_list":null,"apc_paid":null,"fwci":0.5217,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.68953261,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"414","last_page":"419"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12702","display_name":"Brain Tumor Detection and Classification","score":0.8500000238418579,"subfield":{"id":"https://openalex.org/subfields/2808","display_name":"Neurology"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T12702","display_name":"Brain Tumor Detection and Classification","score":0.8500000238418579,"subfield":{"id":"https://openalex.org/subfields/2808","display_name":"Neurology"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T13693","display_name":"Smart Systems and Machine Learning","score":0.8021000027656555,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13345","display_name":"Advanced Technologies and Applied Computing","score":0.7979999780654907,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7459373474121094},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.7233037352561951},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7049267888069153},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6184017658233643},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6109536290168762},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.5359542965888977},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.47692224383354187},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.47084447741508484},{"id":"https://openalex.org/keywords/digital-signature-algorithm","display_name":"Digital Signature Algorithm","score":0.46123313903808594},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4248402714729309},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4230741262435913},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4069752097129822},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34047940373420715},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3101244568824768},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22792619466781616},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1021433174610138},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.0765400230884552}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7459373474121094},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.7233037352561951},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7049267888069153},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6184017658233643},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6109536290168762},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.5359542965888977},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.47692224383354187},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.47084447741508484},{"id":"https://openalex.org/C202424057","wikidata":"https://www.wikidata.org/wiki/Q1224829","display_name":"Digital Signature Algorithm","level":4,"score":0.46123313903808594},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4248402714729309},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4230741262435913},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4069752097129822},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34047940373420715},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3101244568824768},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22792619466781616},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1021433174610138},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0765400230884552},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bcca62388.2024.10844381","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bcca62388.2024.10844381","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 6th International Conference on Blockchain Computing and Applications (BCCA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1486653797","https://openalex.org/W1569096659","https://openalex.org/W1851882747","https://openalex.org/W2013613544","https://openalex.org/W2041942569","https://openalex.org/W2055180517","https://openalex.org/W2063355793","https://openalex.org/W2106470790","https://openalex.org/W2620284884","https://openalex.org/W2766343927","https://openalex.org/W2769002409","https://openalex.org/W2781944693","https://openalex.org/W2808808846","https://openalex.org/W2897450989","https://openalex.org/W2957595524","https://openalex.org/W2963264685","https://openalex.org/W2969592215","https://openalex.org/W3000142974","https://openalex.org/W6639653524"],"related_works":["https://openalex.org/W4226182343","https://openalex.org/W2998969597","https://openalex.org/W3213981908","https://openalex.org/W2391691397","https://openalex.org/W4387407403","https://openalex.org/W2392378177","https://openalex.org/W2130871907","https://openalex.org/W4249541918","https://openalex.org/W4255730851","https://openalex.org/W4319302742"],"abstract_inverted_index":{"Biometric":[0],"systems":[1],"have":[2],"significant":[3],"security":[4],"vulnerabilities":[5],"such":[6],"as":[7,129],"the":[8,48,74,78,81,94,108,132],"possibility":[9],"of":[10,16,77,84,107,114],"biometric":[11,30,33,37,49],"data":[12,38,50],"leakage,":[13],"non-transparency,":[14],"lack":[15],"confidentiality,":[17],"and":[18,35,80,104,122],"inconsistent":[19],"authentication":[20,124,133],"mechanisms.":[21],"This":[22],"study":[23],"proposes":[24],"a":[25],"distributed":[26],"approach":[27,42],"for":[28],"storing":[29],"data,":[31],"performing":[32],"authentication,":[34],"handling":[36],"using":[39],"an":[40,55],"auditable":[41],"utilizing":[43],"blockchain":[44,67],"technology.":[45],"We":[46],"secure":[47,121],"by":[51,93],"encrypting":[52],"it":[53,119],"with":[54],"asymmetric":[56],"key":[57],"algorithm:":[58],"Elliptic":[59],"Curve":[60],"Digital":[61],"Signature":[62],"Algorithm":[63],"(ECDSA).":[64],"A":[65],"decentralized":[66],"network":[68],"is":[69,97],"then":[70],"used":[71],"to":[72,131],"store":[73],"signed":[75],"hash":[76],"template,":[79],"execution":[82],"time":[83],"various":[85],"smart":[86],"contract":[87],"operations":[88],"are":[89],"recorded.":[90],"FRR":[91],"achieved":[92],"proposed":[95,115],"scheme":[96,116,134],"also":[98],"reported":[99],"on":[100],"DB1,":[101],"DB2,":[102],"DB3":[103],"DB4":[105],"datasets":[106],"FVC2004":[109],"database,":[110],"respectively.":[111],"The":[112],"evaluation":[113],"demonstrates":[117],"that":[118],"enables":[120],"reliable":[123],"incurring":[125],"negligible":[126],"performance":[127],"overhead":[128],"compared":[130],"without":[135],"encryption.":[136]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
