Secure Information Sharing Using Personal Biometric Characteristics

被引:0
|
作者
Ogiela, Marek R. [1 ]
Ogiela, Urszula [1 ]
Ogiela, Lidia [1 ]
机构
[1] AGH Univ Sci & Technol, Al Mickiewicza 30, PL-30059 Krakow, Poland
来源
COMPUTER APPLICATIONS FOR BIO-TECHNOLOGY, MULTIMEDIA, AND UBIQUITOUS CITY | 2012年 / 353卷
关键词
security of distributed information; cryptography; Urban Life; personal identification processes; information sharing; LINGUISTIC THRESHOLD SCHEMES; SYSTEMS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this publication will be proposed a new algorithm for secure information sharing using personal or biometric information. In classic cryptographic threshold schemes used for secret splitting or sharing there aren't any connection between generated shares and particular participants of communication protocol. Sometimes it may be worth to generate personalized shadows, which allow not only recovery the original information or secret data, but also to identify who exactly took part in the secret reconstruction procedure. In the paper will be described the way of extraction some personal or biometric characteristics using cognitive information systems, as well as the algorithm of application such personal information for shadow generation in threshold schemes. Such new approach may play a great role in intelligent distributed computing or secure urban life.
引用
收藏
页码:369 / +
页数:2
相关论文
共 50 条
  • [1] Biometric personal identification using sole information
    Yamakawa, Takeshi
    Taniguchi, Kazuhiko
    Momen, Toshio
    Kobashi, Syoji
    Kondo, Katsuya
    Hata, Yutaka
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 2918 - +
  • [2] A robust and secure image sharing scheme with personal identity information embedded
    Wang, Ping
    He, Xing
    Zhang, Yushu
    Wen, Wenying
    Li, Ming
    COMPUTERS & SECURITY, 2019, 85 : 107 - 121
  • [3] Design and Implementation of Secure Biometric Based Authentication System using RFID and Secret Sharing
    Patil, Sonali
    Dhumal, Priyanka
    Lokhande, Shweta
    Kamble, Trishala
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 480 - 482
  • [4] Secure information sharing using role-based delegation
    Ahn, GJ
    Mohan, B
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 810 - 815
  • [5] Secure information sharing in social agent interactions using information flow analysis
    Bijani, Shahriar
    Robertson, David
    Aspinall, David
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2018, 70 : 52 - 66
  • [6] Achieving secure and convenient WLAN sharing in personal
    Yan, Zhicheng
    Yang, Chao
    You, Wei
    Guo, Jingjing
    Zhang, Junwei
    Zheng, Yu
    Ma, Jianfeng
    IET INFORMATION SECURITY, 2020, 14 (06) : 733 - 744
  • [7] Secure Authentication Using Biometric Methods
    Rejman-Greene, Marek
    Information Security Technical Report, 2002, 7 (03): : 30 - 40
  • [8] Secure information sharing for grid computing
    Abbadi, Imad M.
    Alawneh, Muntaha
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (06) : 486 - 502
  • [9] A Metadata Calculus for Secure Information Sharing
    Srivatsa, Mudhakar
    Agrawal, Dakshi
    Reidt, Steffen
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 488 - 499
  • [10] Towards secure information sharing using role-based delegation
    Ahn, Gall-Joon
    Mohan, Badrinath
    Hong, Seng-Phil
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) : 42 - 59