Subspace Fuzzy Vault

  • Kyle Marshall
  • Davide Schipani
  • Anna-Lena Trautmann
  • Joachim Rosenthal
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 358)


Fuzzy vault is a scheme providing secure authentication based on fuzzy matching of sets. A major application is the use of biometric features for authentication, whereby unencrypted storage of these features is not an option because of security concerns. While there is still ongoing research around the practical implementation of such schemes, we propose and analyze here an alternative construction based on subspace codes. This offers some advantages in terms of security, as an eventual discovery of the key does not provide an obvious access to the features. Crucial for an efficient implementation are the computational complexity and the choice of good code parameters. The parameters depend on the particular application, e.g. the biometric feature to be stored and the rate one wants to allow for false acceptance. The developed theory is closely linked to constructions of subspace codes studied in the area of random network coding.


  1. 1.
    Baldi M, Bianchi M, Chiaraluce F, Rosenthal J, Schipani D (2011) On fuzzy syndrome hashing with LDPC coding. In: Proceeding of 4th international sympoisum applied sciences in biomedical and communication technologies (ISABEL), pp 1–5Google Scholar
  2. 2.
    Choi WY, Lee S, Moon D, Chung Y, Moon KY (2008) A fast algorithm for polynomial reconstruction of fuzzy fingerprint vault. IEICE Electron Express 5(18):725–731CrossRefGoogle Scholar
  3. 3.
    Clancy C (2003) Secure smartcard-based fingerprint authentication. In: ACM Workshop on biometrics: methods and applications, pp 45–52Google Scholar
  4. 4.
    Fontein F, Marshall K, Rosenthal J, Schipani D, Trautmann AL (2012) On burst error correction and storage security of noisy data. In: Proceeding 20th international symposium mathematical theory of networks and systems (MTNS)Google Scholar
  5. 5.
    Gorla E, Manganiello F, Rosenthal J (2012) An algebraic approach for decoding spread codes. Adv Math Commun (AMC) 6(4):443–466MATHMathSciNetCrossRefGoogle Scholar
  6. 6.
    Hartloff J, Bileschi M, Tulyakov S, Dobler J, Rudra A, Govindaraju V (2013) Security analysis for fingerprint fuzzy vaults. In: SPIE defense, security and sensingGoogle Scholar
  7. 7.
    Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Crypt 38(2):237–257MATHMathSciNetCrossRefGoogle Scholar
  8. 8.
    Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceeding 6th ACM conference on computer and communications security, CCS ’99, pp 28–36Google Scholar
  9. 9.
    Koetter R, Kschichang F (2007) Coding for errors and erasures in random network coding. In Proceeding of IEEE international symposium, information theoryGoogle Scholar
  10. 10.
    Laksov D, Thorup A (1994) Counting matrices with coordinates in finite fields and of fixed rank. Mathematica Scandinavica 74:19–33MATHMathSciNetGoogle Scholar
  11. 11.
    Li P, Yang X, Cao K, Tao X, Wang R, Tian J (2010) An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J Netw Comput Appl 33(3):207–220CrossRefGoogle Scholar
  12. 12.
    MacWilliams FJ, Sloane N (1977) The Theory of Error-Correcting Codes. North Holland, AmsterdamGoogle Scholar
  13. 13.
    Manganiello F, Gorla E, Rosenthal J (2008) Spread codes and spread decoding in network coding. In: Proceeding of IEEE international symposium information theory, pp 881–885Google Scholar
  14. 14.
    Manganiello F, Trautmann A-L (2014) Spread decoding in extension fields. Finite Fields Appl 25:94–105MATHMathSciNetCrossRefGoogle Scholar
  15. 15.
    Mihailescu P, Munk A, Tams B (2009) The fuzzy vault for fingerprints is vulnerable to brute force attack. In: Proceeding of BIOSIG, pp 43–54Google Scholar
  16. 16.
    Poon HT, Miri A (2012) On efficient decoding for the fuzzy vault scheme. In: IEEE 11th International conference information science signal processing and their application, pp 454–459Google Scholar
  17. 17.
    Schipani D, Rosenthal J (2010) Coding solutions for the secure biometric storage problem. In: Information theory workshop (ITW), 2010 IEEE, Dublin, Ireland, pp 1–4Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Kyle Marshall
    • 1
  • Davide Schipani
    • 1
  • Anna-Lena Trautmann
    • 2
    • 3
  • Joachim Rosenthal
    • 1
  1. 1.Institute of MathematicsUniversity of ZurichZurichSwitzerland
  2. 2.Department of Electrical and Electronic EngineeringUniversity of MelbourneMelbourneAustralia
  3. 3.Department of Electrical and Computer Systems EngineeringMonash UniversityMelbourneAustralia

Personalised recommendations