Skip to main content

Fuzzy Vault for Multiple Users

  • Conference paper
Progress in Cryptology - AFRICACRYPT 2012 (AFRICACRYPT 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7374))

Included in the following conference series:

Abstract

We introduce an extension of the Fuzzy Vault scheme to support multiple users. Namely, different participants might share the same vault to store their secret. In the classical Fuzzy Vault, a user locks a secret using a set A and one can unlock it by providing another set B which overlaps substantially with A. In our extension, our Extended Fuzzy Vault is locked thanks to different sets A j, j = 1,…,l and can be unlocked with a set B with enough common elements with one of these A j. Our results are based on Folded Reed-Solomon Codes and their recent list recovery algorithm. This way, our idea can be interpreted as a natural extension of the list decoding of the Reed-Solomon Codes to list recovery. We give a security analysis of our proposal relying on Secure Sketches security properties to gauge our results. Finally, we provide details on an implementation to support our ideas.

This work has been partially funded by the French ANR project BMOS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chae, S.H., Lim, S.J., Bae, S.H., Chung, Y., Pan, S.B.: Parallel processing of the fuzzy fingerprint vault based on geometric hashing. TIIS 4(6), 1294–1310 (2010)

    Google Scholar 

  2. Chung, Y., Moon, D., Lee, S., Jung, S., Kim, T., Ahn, D.: Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 358–369. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Guruswami, V.: Linear-algebraic list decoding of folded Reed Solomon codes. In: IEEE Conference on Computational Complexity, pp. 77–85. IEEE Computer Society (2011)

    Google Scholar 

  5. Guruswami, V., Rudra, A.: Explicit codes achieving list decoding capacity: Error-correction with optimal redundancy. IEEE Transactions on Information Theory 54(1), 135–150 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  6. Guruswami, V., Sudan, M.: Improved decoding of Reed Solomon and algebraic-geometric codes. In: FOCS, pp. 28–39. IEEE Computer Society (1998)

    Google Scholar 

  7. Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of IEEE International Symposium on Information Theory, ISIT. LNCS, p. 408 (2002)

    Google Scholar 

  8. Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Cryptography 38(2), 237–257 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  9. Lee, S., Moon, D., Jung, S., Chung, Y.: Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table. In: Beliczynski, B., Dzielinski, A., Iwanowski, M., Ribeiro, B. (eds.) ICANNGA 2007, Part II. LNCS, vol. 4432, pp. 432–439. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  10. Li, J., Yang, X., Tian, J., Shi, P., Li, P.: Topological structure-based alignment for fingerprint fuzzy vault. In: 19th International Conference on Pattern Recognition (ICPR 2008), Tampa, Florida, USA, December 8-11, pp. 1–4 (2008)

    Google Scholar 

  11. Li, P., Yang, X., Cao, K., Shi, P., Tian, J.: Security-Enhanced Fuzzy Fingerprint Vault Based on Minutiae’s Local Ridge Information. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 930–939. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  12. Li, P., Yang, X., Cao, K., Tao, X., Wang, R., Tian, J.: An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J. Network and Computer Applications 33(3), 207–220 (2010)

    Article  Google Scholar 

  13. Lim, S.J., Chae, S.-H., Pan, S.B.: VLSI Architecture of the Fuzzy Fingerprint Vault System. In: Schwenker, F., El Gayar, N. (eds.) ANNPR 2010. LNCS, vol. 5998, pp. 252–258. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  14. MacWilliams, F.J., Sloane, N.J.A.: The theory of error correcting codes. North-Holland Pub. Co. (1977)

    Google Scholar 

  15. Merkle, J., Niesing, M., Schwaiger, M., Ihmor, H., Korte, U.: Performance of the fuzzy vault for multiple fingerprints. In: Brömme, A., Busch, C. (eds.) BIOSIG. LNI, vol. 164, pp. 57–72. GI (2010)

    Google Scholar 

  16. Moon, D., Lee, S., Jung, S., Chung, Y., Park, M., Yi, O.: Fingerprint Template Protection Using Fuzzy Vault. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. LNCS, vol. 4707, pp. 1141–1151. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  17. Nagar, A., Nandakumar, K., Jain, A.K.: Securing fingerprint template: Fuzzy vault with minutiae descriptors. In: 19th International Conference on Pattern Recognition (ICPR 2008), Tampa, Florida, USA, December 8-11, pp. 1–4 (2008)

    Google Scholar 

  18. Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: Implementation and performance. IEEE Transactions on Information Forensics and Security 2(4), 744–757 (2007)

    Article  Google Scholar 

  19. Nandakumar, K., Nagar, A., Jain, A.K.: Hardening Fingerprint Fuzzy Vault Using Password. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 927–937. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  20. Rudra, A.: List Decoding and Property Testing of Error Correcting Codes. Ph.D. thesis, University of Washington (2007)

    Google Scholar 

  21. Smith, A.D.: Maintaining secrecy when information leakage is unavoidable. Ph.D. thesis, Cambridge, MA, USA (2004), aAI0807529

    Google Scholar 

  22. Sudan, M.: Decoding of Reed Solomon codes beyond the error-correction bound. J. Complexity 13(1), 180–193 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  23. Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy Vault for Fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bringer, J., Chabanne, H., Favre, M. (2012). Fuzzy Vault for Multiple Users. In: Mitrokotsa, A., Vaudenay, S. (eds) Progress in Cryptology - AFRICACRYPT 2012. AFRICACRYPT 2012. Lecture Notes in Computer Science, vol 7374. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31410-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31410-0_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31409-4

  • Online ISBN: 978-3-642-31410-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics