Advertisement

A Key Sharing Fuzzy Vault Scheme

  • Lin You
  • Mengsheng Fan
  • Jie Lu
  • Shengguo Wang
  • Fenghai Li
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7618)

Abstract

Based on the classical fuzzy vault and the Diffie-Hellman key exchange scheme, a key sharing fuzzy vault scheme is proposed. In this fuzzy vault scheme, the two users cooperatively build their shared fuzzy vault with a shared key hidden in it using their own biometric features, and they can respectively use their biometric features to unlock the fuzzy vault to get their shared key without running the risk of disclosure of their biometric features later. The security of our scheme is based on the security of the classical fuzzy vault scheme and and the discrete logarithm problem in a given finite group.

Keywords

Fuzzy Vault Diffie-Hellman key exchange Finite group Biometrics Polynomial interpolation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Juels, A., Sudan, M.: A fuzzy vault scheme. In: IEEE International Symposium on Information Theory (ISIT), p. 408. IEEE Press, Lausanne (2002)Google Scholar
  2. 2.
    Juels, A., Sudan, M.: A fuzzy vault scheme. Designs, Codes, and Cryptography 38(2), 237–257 (2006)MathSciNetzbMATHCrossRefGoogle Scholar
  3. 3.
    Sorger, U.K.: A New Reed-Solomon Code Decoding Algorithm Based on Newton’s Interpolation. IEEE Transactions on Information Theory 39(2), 358–365 (1993)MathSciNetzbMATHCrossRefGoogle Scholar
  4. 4.
    Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy Vault for Fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)MathSciNetzbMATHCrossRefGoogle Scholar
  6. 6.
    Guruswami, V., Sudan, M.: Improved deconding of Reed-Solomon and Algebraic-Geometric codes. IEEE Transactions on Information Theory 45(6), 1757–1767 (1999)MathSciNetzbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Lin You
    • 1
  • Mengsheng Fan
    • 1
  • Jie Lu
    • 2
  • Shengguo Wang
    • 2
  • Fenghai Li
    • 3
  1. 1.College of Comm. Engr.Hangzhou Dianzi Univ.HangzhouChina
  2. 2.Zhejiang Wellcom Technology Co., LtdHangzhouChina
  3. 3.The Key Lab. of Information Assurance TechnologyBeijingChina

Personalised recommendations