@InProceedings{JoanArnedo-Moreno2010, author="Joan Arnedo-Moreno and Agata Lapedriza", title="Visualizing key authenticity: turning your face into your public key", booktitle="6th China International Conference on Information Security and Cryptology", year="2010", pages="605--618", abstract="Biometric information has become a technology complementary to cryptography, allowing to conveniently manage cryptographic data. Two important needs are ful lled: rst of all, making such data always readily available, and additionally, making its legitimate owner easily identi able. In this work we propose a signature system which integrates face recognition biometrics with and identity-based signature scheme, so the user{\textquoteright}s face e ectively becomes his public key and system ID. Thus, other users may verify messages using photos of the claimed sender, providing a reasonable trade-o between system security and usability, as well as a much more straightforward public key authenticity and distribution process.", optnote="OR;MV", optnote="exported from refbase (http://refbase.cvc.uab.es/show.php?record=2149), last updated on Thu, 20 Feb 2014 10:15:08 +0100" }