A Key Management Algorithm Based on Fingerprint and Fuzzy Decision

Article Preview

Abstract:

This paper presents an algorithm about key management including key generation and key recovery in cryptosystem based on fingerprint and fuzzy decision. Traditional key for the encryption and decryption is remembered by a trusted person, or stored in a safety location. The key may be lost or misused for the person’s self-ish desire. Sharing secret algorithm is used to prevent from misusing in a single management, and fuzzy vault scheme is used to avoid the disadvantage of numerical password. But the proposed method is not an easy combination of fuzzy vault and sharing secret. To keep from the collusion among some persons, a simple fuzzy decision is added in the proposed method. Security analysis and experimental results are given to show the proposed algorithm is feasible and safe for key management in cryptosystem.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1907-1910

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] A. Shamir. How to share a secret [J]. Communications of the ACM (1979), pp.612-613.

Google Scholar

[2] D. Maltoni, D. Maio, A.K. Jain, Salil Prabhakar. Handbook of Fingerprint Recognition (Second Edition). Springer, in press (2009), pp.46-127.

Google Scholar

[3] M. Alexander, M. Michael, R. Kimmel. Three-Dimensional Face Recognition [J]. International Journal of Computer Vision, (2005), pp.5-30.

Google Scholar

[4] J.S. Noh, K.H. Rhee. Palmprint Identification Algorithm Using Hu Invariant Moments [C]. Computer and Information Science (2005), pp.94-99.

DOI: 10.1109/icis.2005.97

Google Scholar

[5] A.K. Jain, A. Ross, S. Prabhakar. An Introduction to Biometric Recognition [J]. IEEE Transactions on Circuits and Systems for Video Technology (2004), pp.4-20.

DOI: 10.1109/tcsvt.2003.818349

Google Scholar

[6] M.S. AlTarawneh, W.L. Woo, S.S. Dlay. Fuzzy Vault Crypto Biometric Key Based on Fingerprint Vector Features [C]. CSNDSP(2008), pp.452-456.

DOI: 10.1109/csndsp.2008.4610727

Google Scholar

[7] Y.J. Lee, K.R. Park, S.J. Lee, et. A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System [J] IEEE Transactions on Systems on Systems, Man, and Cybernetics –part B: Cybernetics (2008), pp.1302-1313.

DOI: 10.1109/tsmcb.2008.927261

Google Scholar

[8] W.J. Scheirer, T.E. Boult. Cracking Fuzzy Vaults and Biometric Encryption [C]. Biometrics Symposium (2007), pp.1-6.

DOI: 10.1109/bcc.2007.4430534

Google Scholar

[9] U. Uludag, S. Pankanti, A.K. Jain. Fuzzy Vault for Fingerprints [C], AVBPA (2005), pp.310-319.

Google Scholar

[10] A. Juels, M. Sudan. A Fuzzy Vault Scheme [J] Designs, Codes and Cryptography (2006), p.237.

DOI: 10.1007/s10623-005-6343-z

Google Scholar