Abstract
We introduce an extension of the Fuzzy Vault scheme to support multiple users. Namely, different participants might share the same vault to store their secret. In the classical Fuzzy Vault, a user locks a secret using a set A and one can unlock it by providing another set B which overlaps substantially with A. In our extension, our Extended Fuzzy Vault is locked thanks to different sets A j, j = 1,…,l and can be unlocked with a set B with enough common elements with one of these A j. Our results are based on Folded Reed-Solomon Codes and their recent list recovery algorithm. This way, our idea can be interpreted as a natural extension of the list decoding of the Reed-Solomon Codes to list recovery. We give a security analysis of our proposal relying on Secure Sketches security properties to gauge our results. Finally, we provide details on an implementation to support our ideas.
Keywords
This work has been partially funded by the French ANR project BMOS.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Chae, S.H., Lim, S.J., Bae, S.H., Chung, Y., Pan, S.B.: Parallel processing of the fuzzy fingerprint vault based on geometric hashing. TIIS 4(6), 1294–1310 (2010)
Chung, Y., Moon, D., Lee, S., Jung, S., Kim, T., Ahn, D.: Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 358–369. Springer, Heidelberg (2005)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)
Guruswami, V.: Linear-algebraic list decoding of folded Reed Solomon codes. In: IEEE Conference on Computational Complexity, pp. 77–85. IEEE Computer Society (2011)
Guruswami, V., Rudra, A.: Explicit codes achieving list decoding capacity: Error-correction with optimal redundancy. IEEE Transactions on Information Theory 54(1), 135–150 (2008)
Guruswami, V., Sudan, M.: Improved decoding of Reed Solomon and algebraic-geometric codes. In: FOCS, pp. 28–39. IEEE Computer Society (1998)
Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of IEEE International Symposium on Information Theory, ISIT. LNCS, p. 408 (2002)
Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Cryptography 38(2), 237–257 (2006)
Lee, S., Moon, D., Jung, S., Chung, Y.: Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table. In: Beliczynski, B., Dzielinski, A., Iwanowski, M., Ribeiro, B. (eds.) ICANNGA 2007, Part II. LNCS, vol. 4432, pp. 432–439. Springer, Heidelberg (2007)
Li, J., Yang, X., Tian, J., Shi, P., Li, P.: Topological structure-based alignment for fingerprint fuzzy vault. In: 19th International Conference on Pattern Recognition (ICPR 2008), Tampa, Florida, USA, December 8-11, pp. 1–4 (2008)
Li, P., Yang, X., Cao, K., Shi, P., Tian, J.: Security-Enhanced Fuzzy Fingerprint Vault Based on Minutiae’s Local Ridge Information. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 930–939. Springer, Heidelberg (2009)
Li, P., Yang, X., Cao, K., Tao, X., Wang, R., Tian, J.: An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J. Network and Computer Applications 33(3), 207–220 (2010)
Lim, S.J., Chae, S.-H., Pan, S.B.: VLSI Architecture of the Fuzzy Fingerprint Vault System. In: Schwenker, F., El Gayar, N. (eds.) ANNPR 2010. LNCS, vol. 5998, pp. 252–258. Springer, Heidelberg (2010)
MacWilliams, F.J., Sloane, N.J.A.: The theory of error correcting codes. North-Holland Pub. Co. (1977)
Merkle, J., Niesing, M., Schwaiger, M., Ihmor, H., Korte, U.: Performance of the fuzzy vault for multiple fingerprints. In: Brömme, A., Busch, C. (eds.) BIOSIG. LNI, vol. 164, pp. 57–72. GI (2010)
Moon, D., Lee, S., Jung, S., Chung, Y., Park, M., Yi, O.: Fingerprint Template Protection Using Fuzzy Vault. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. LNCS, vol. 4707, pp. 1141–1151. Springer, Heidelberg (2007)
Nagar, A., Nandakumar, K., Jain, A.K.: Securing fingerprint template: Fuzzy vault with minutiae descriptors. In: 19th International Conference on Pattern Recognition (ICPR 2008), Tampa, Florida, USA, December 8-11, pp. 1–4 (2008)
Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: Implementation and performance. IEEE Transactions on Information Forensics and Security 2(4), 744–757 (2007)
Nandakumar, K., Nagar, A., Jain, A.K.: Hardening Fingerprint Fuzzy Vault Using Password. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 927–937. Springer, Heidelberg (2007)
Rudra, A.: List Decoding and Property Testing of Error Correcting Codes. Ph.D. thesis, University of Washington (2007)
Smith, A.D.: Maintaining secrecy when information leakage is unavoidable. Ph.D. thesis, Cambridge, MA, USA (2004), aAI0807529
Sudan, M.: Decoding of Reed Solomon codes beyond the error-correction bound. J. Complexity 13(1), 180–193 (1997)
Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy Vault for Fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bringer, J., Chabanne, H., Favre, M. (2012). Fuzzy Vault for Multiple Users. In: Mitrokotsa, A., Vaudenay, S. (eds) Progress in Cryptology - AFRICACRYPT 2012. AFRICACRYPT 2012. Lecture Notes in Computer Science, vol 7374. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31410-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-31410-0_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31409-4
Online ISBN: 978-3-642-31410-0
eBook Packages: Computer ScienceComputer Science (R0)