Deep learning-based biometric cryptographic key generation with post-quantum security

被引:1
|
作者
Kuznetsov, Oleksandr [1 ,2 ,3 ]
Zakharov, Dmytro [4 ]
Frontoni, Emanuele [1 ,5 ]
机构
[1] Univ Macerata, Dept Polit Sci Commun & Int Relat, Via Crescimbeni,30-32, I-62100 Macerata, MC, Italy
[2] Comenius Univ, Dept Informat Syst, Fac Management, Odbojarov 10, Bratislava 25, Slovakia
[3] Kharkov Natl Univ, Dept Informat & Commun Syst Secur, 4 Svobody Sq, UA-61022 Kharkiv, Ukraine
[4] Kharkov Natl Univ, Dept Appl Math, 4 Svobody Sq, UA-61022 Kharkiv, Ukraine
[5] Marche Polytech Univ, Dept Informat Engn, Via Brecce Bianche 12, I-60131 Ancona, AN, Italy
关键词
Cryptographic keys; Deep learning models; Convolutional neural networks; Fuzzy extractor; Biometric face images; Code-based cryptosystems; FUZZY VAULT; SCHEME;
D O I
10.1007/s11042-023-17714-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on stochastic random processes and intricate mathematical transformations. While these keys ensure robust security, their storage and distribution necessitate sophisticated and costly mechanisms. This study explores an alternative approach that leverages biometric data for generating cryptographic keys, thereby eliminating the need for complex storage and distribution processes. The paper investigates biometric key generation technologies based on deep learning models, specifically utilizing convolutional neural networks to extract biometric features from human facial images. Subsequently, code-based cryptographic extractors are employed to process the primary extracted features. The performance of various deep learning models and the extractor is evaluated by considering Type 1 and Type 2 errors. The optimized algorithm parameters yield an error rate of less than 10%, rendering the generated keys suitable for biometric authentication. Additionally, this study demonstrates that the application of code-based cryptographic extractors provides a post-quantum level of security, further enhancing the practicality and effectiveness of biometric key generation technologies in modern information security systems. This research contributes to the ongoing efforts towards secure, efficient, and user-friendly authentication and encryption methods, harnessing the power of biometric data and deep learning techniques.
引用
收藏
页码:56909 / 56938
页数:30
相关论文
共 50 条
  • [41] Directional Area Based Minutiae Selection and Cryptographic Key Generation Using Biometric Fingerprint
    Panchal, Gaurang
    Samanta, Debasis
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 491 - 499
  • [42] Post-quantum security of messengers: secure group chats and continuous key distribution protocols
    Julia Bobrysheva
    Sergey Zapechnikov
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 373 - 380
  • [43] Post-Quantum Security Models for Authenticated Encryption
    Soukharev, Vladimir
    Jao, David
    Seshadri, Srinath
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 64 - 78
  • [44] Post-quantum security on the Lai–Massey scheme
    Zhongya Zhang
    Wenling Wu
    Han Sui
    Bolin Wang
    Designs, Codes and Cryptography, 2023, 91 : 2687 - 2704
  • [45] Traceable Ring Signatures with Post-quantum Security
    Feng, Hanwen
    Liu, Jianwei
    Wu, Qianhong
    Li, Ya-Nan
    TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 442 - 468
  • [46] Post-quantum security of messengers: secure group chats and continuous key distribution protocols
    Bobrysheva, Julia
    Zapechnikov, Sergey
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (03) : 373 - 380
  • [47] Post-quantum key exchange - a new hope
    Alkim, Erdem
    Ducas, Leo
    Poeppelmann, Thomas
    Schwabe, Peter
    PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 327 - 343
  • [48] Strengthening Post-Quantum Security for Automotive Systems
    Fritzmann, Tim
    Vith, Jonas
    Sepulveda, Johanna
    2020 23RD EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2020), 2020, : 570 - 576
  • [49] How to plan for a post-quantum security ecosystem
    Gerhardt N.
    Network Security, 2022, 2022 (03)
  • [50] A Note on the Post-quantum Security of (Ring) Signatures
    Chatterjee, Rohit
    Chung, Kai-Min
    Liang, Xiao
    Malavolta, Giulio
    PUBLIC-KEY CRYPTOGRAPHY, PKC 2022, PT II, 2022, 13178 : 407 - 436