A new security scheme based on palmprint biometrics for signature

被引:0
|
作者
Shi, Ruiqiong [1 ]
Sun, Dongmei [1 ]
机构
[1] Beijing Jiaotong Univ, Inst Informat Sci, Beijing 100044, Peoples R China
关键词
palmprint; biometrics; gabor filter; secure key management; signature;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a palmprint biometrics technology for secure key management and signature; and a practical and secure cryptographic algorithm is proposed. The algorithm provides a method of generating reliably binary templates, or "biometric templates", from genuine palmprint image using 2-D Gabor filters. The biometric template can replace traditional password used for secure key management, which can protect the secrecy of the master key used for key pair generation before signature. A public key and corresponding private key can be created using the elliptic curve point embedding technique. Based on the above ideas, we use a pairing based signature scheme to perform signing and verification on the elliptic curve. Finally, the scheme was evaluated using 98 different person's right hands and proved to have higher accuracy and better FRR rates compared with the prior work.
引用
收藏
页码:101 / 106
页数:6
相关论文
共 50 条
  • [41] New (t,n) threshold directed signature scheme with provable security
    Lu, Rongxing
    Lin, Xiaodong
    Cao, Zhenfu
    Shao, Jun
    Liang, Xiaohui
    [J]. INFORMATION SCIENCES, 2008, 178 (03) : 756 - 765
  • [42] On the security of a convertible group signature scheme
    Saeednia, S
    [J]. INFORMATION PROCESSING LETTERS, 2000, 73 (3-4) : 93 - 96
  • [43] ENHANCING THE SECURITY OF ELGAMAL SIGNATURE SCHEME
    HE, J
    KIESLER, T
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (04): : 249 - 252
  • [44] Verified Security of BLT Signature Scheme
    Firsov, Denis
    Buldas, Ahto
    Truu, Ahto
    Laanoja, Risto
    [J]. CPP '20: PROCEEDINGS OF THE 9TH ACM SIGPLAN INTERNATIONAL CONFERENCE ON CERTIFIED PROGRAMS AND PROOFS, 2020, : 244 - 257
  • [45] SECURITY OF XINMEI DIGITAL SIGNATURE SCHEME
    ALABBADI, M
    WICKER, SB
    [J]. ELECTRONICS LETTERS, 1992, 28 (09) : 890 - 891
  • [46] The security flaw of an untraceable signature scheme
    Chang, CC
    Chang, YF
    [J]. SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1379 - 1381
  • [47] A New Signature Scheme Based on Cubic Residues
    Dong, Xuedong
    Liu, Xinxin
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTER SCIENCE (ICEMC 2016), 2016, 129 : 804 - 807
  • [48] A New RSA-Based Signature Scheme
    Schaege, Sven
    Schwenk, Joerg
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 1 - 15
  • [49] On the Security of a Certificateless Short Signature Scheme
    Behnia, Rouzbeh
    Heng, Swee-Huay
    Tan, Syh-Yuan
    [J]. MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2015, 9 : 103 - 113
  • [50] On the Security of a Certificateless Aggregate Signature Scheme
    Shim, Kyung-Ah
    [J]. IEEE COMMUNICATIONS LETTERS, 2011, 15 (10) : 1136 - 1138