Deep learning-based biometric cryptographic key generation with post-quantum security

被引:1
|
作者
Kuznetsov, Oleksandr [1 ,2 ,3 ]
Zakharov, Dmytro [4 ]
Frontoni, Emanuele [1 ,5 ]
机构
[1] Univ Macerata, Dept Polit Sci Commun & Int Relat, Via Crescimbeni,30-32, I-62100 Macerata, MC, Italy
[2] Comenius Univ, Dept Informat Syst, Fac Management, Odbojarov 10, Bratislava 25, Slovakia
[3] Kharkov Natl Univ, Dept Informat & Commun Syst Secur, 4 Svobody Sq, UA-61022 Kharkiv, Ukraine
[4] Kharkov Natl Univ, Dept Appl Math, 4 Svobody Sq, UA-61022 Kharkiv, Ukraine
[5] Marche Polytech Univ, Dept Informat Engn, Via Brecce Bianche 12, I-60131 Ancona, AN, Italy
关键词
Cryptographic keys; Deep learning models; Convolutional neural networks; Fuzzy extractor; Biometric face images; Code-based cryptosystems; FUZZY VAULT; SCHEME;
D O I
10.1007/s11042-023-17714-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on stochastic random processes and intricate mathematical transformations. While these keys ensure robust security, their storage and distribution necessitate sophisticated and costly mechanisms. This study explores an alternative approach that leverages biometric data for generating cryptographic keys, thereby eliminating the need for complex storage and distribution processes. The paper investigates biometric key generation technologies based on deep learning models, specifically utilizing convolutional neural networks to extract biometric features from human facial images. Subsequently, code-based cryptographic extractors are employed to process the primary extracted features. The performance of various deep learning models and the extractor is evaluated by considering Type 1 and Type 2 errors. The optimized algorithm parameters yield an error rate of less than 10%, rendering the generated keys suitable for biometric authentication. Additionally, this study demonstrates that the application of code-based cryptographic extractors provides a post-quantum level of security, further enhancing the practicality and effectiveness of biometric key generation technologies in modern information security systems. This research contributes to the ongoing efforts towards secure, efficient, and user-friendly authentication and encryption methods, harnessing the power of biometric data and deep learning techniques.
引用
收藏
页码:56909 / 56938
页数:30
相关论文
共 50 条
  • [31] Machine Learning Method with Applications in Hardware Security of Post-Quantum Cryptography
    Haibo Yi
    Journal of Grid Computing, 2023, 21
  • [32] Survey of Biometric Based Key Generation to Enhance Security of Cryptosystems
    Sadkhan, Sattar B.
    AL-Shukur, Baheeja K.
    Mattar, Ali K.
    2016 AL-SADIQ INTERNATIONAL CONFERENCE ON MULTIDISCIPLINARY IN IT AND COMMUNICATION TECHNIQUES SCIENCE AND APPLICATIONS (AIC-MITCSA), 2016,
  • [33] Post-Quantum cryptographic schemes library for Android operating system
    Saucedo-Estrada, Olimpia
    Cedillo Hernandez, Manuel
    Gallegos-Garcia, Gina
    Salinas-Rosales, Moises
    PROCEEDINGS OF THE XXII 2020 IEEE INTERNATIONAL AUTUMN MEETING ON POWER, ELECTRONICS AND COMPUTING (ROPEC 2020), VOL 4, 2020,
  • [34] Post-Quantum Universal Composable OT Based on Key Exchange
    Hangchao, Ding
    Jiang, Han
    Xu, Qiuliang
    IEEE ACCESS, 2020, 8 : 148445 - 148459
  • [35] Deep Learning-Based Channel Reciprocity Learning for Physical Layer Secret Key Generation
    He, Haoyu
    Chen, Yanru
    Huang, Xinmao
    Xing, Minghai
    Li, Yang
    Xing, Bin
    Chen, Liangyin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [36] Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs
    Ono, Tatsuki
    Bian, Song
    Sato, Takashi
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [37] Common Randomness Generation for Information Theoretic Security in Post-Quantum Internet of Things
    Sheshagiri, Prashanth K. H.
    Das, Siddharth
    Cabrera, Juan A.
    Bassoli, Riccardo
    Fitzek, Frank H. P.
    2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [38] Reliable Hash Trees for Post-quantum Stateless Cryptographic Hash-based Signatures
    Mozaffari-Kermani, Mehran
    Azarderakhsh, Reza
    PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFTS), 2015, : 103 - 108
  • [39] Cryptographic Key Generation from Biometric Data Using Wavelets
    Garcia-Baleon, H. A.
    Alarcon-Aquino, V.
    CERMA: 2009 ELECTRONICS ROBOTICS AND AUTOMOTIVE MECHANICS CONFERENCE, 2009, : 15 - 20
  • [40] Ensuring Security & Trust in a Post-Quantum Environment
    Manfred Paeschke
    Walter Fumy
    Andreas Wilke
    Datenschutz und Datensicherheit - DuD, 2019, 43 (7) : 440 - 443