Enhanced biometric encryption algorithm for private key protection in BioPKI system

被引:0
|
作者
Cheol-Joo Chae
Kwang-Nam Choi
Kiseok Choi
Jae-Soo Kim
YongJu Shin
机构
[1] Korea Institute of Science and Technology Information,
来源
关键词
BioPKI system; fingerprint; biometric encryption; secret share;
D O I
暂无
中图分类号
学科分类号
摘要
Protection of private key is the most critical part in public key infrastructure (PKI) system since it depends on the confidentiality of private key. Thread of password detection has been known as the vulnerability in this PKI system. Recently, studies have been conducted on BioPKI system that uses the biometric information of users in order to replace the password type of private key protection in PKI system. However, BioPKI system also has vulnerability in that biometric information used for protection of private key cannot be reused once it is stolen or lost. So, we propose the method to protect the private key using FIDSEQi which binds sequence to biometric information. The proposed method enhances reusability of biometric information and presents higher attack complexity than the method of authentication by cross matching single biometric information.
引用
收藏
页码:4286 / 4290
页数:4
相关论文
共 50 条
  • [41] Function-private functional encryption in the private-key setting
    Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot
    76100, Israel
    不详
    91904, Israel
    Lect. Notes Comput. Sci., (306-324):
  • [42] Homomorphic Encryption: From Private-Key to Public-Key
    Rothblum, Ron
    THEORY OF CRYPTOGRAPHY, 2011, 6597 : 219 - 234
  • [43] Building Key-Private Public-Key Encryption Schemes
    Paterson, Kenneth G.
    Srinivasan, Sriramkrishnan
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 276 - 292
  • [44] Enterprise private cloud file encryption system based on tripartite secret key protocol
    Li, Xinxian
    Li, Weiqin
    Shi, Daisong
    PROCEEDINGS OF THE 2015 INTERNATIONAL INDUSTRIAL INFORMATICS AND COMPUTER ENGINEERING CONFERENCE, 2015, : 166 - 169
  • [45] Normalized Unconditional ε-Security of Private-Key Encryption
    Bi, Lvqing
    Dai, Songsong
    Hu, Bo
    ENTROPY, 2017, 19 (03)
  • [46] A Novel Image Encryption Scheme Using an Irrevocable Multimodal Biometric Key
    Suchithra, M.
    Sikha, O. K.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 256 - 264
  • [47] Enhanced Chaotic Key-Based Algorithm for Low-Entropy Image Encryption
    Yavuz, Erdem
    Yazici, Rifat
    Kasapbasi, Mustafa Cem
    Yamac, Ezgi
    2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, : 385 - 388
  • [48] PRIVATE-KEY ENCRYPTION BASED ON CONCATENATION OF CODES
    ALJABRI, AK
    ALTHUKAIR, F
    MIRZA, A
    IEE PROCEEDINGS-COMMUNICATIONS, 1994, 141 (03): : 105 - 110
  • [49] On private-key encryption using product codes
    Sun, Hung-Min
    Computers and Electrical Engineering, 1999, 25 (06): : 439 - 450
  • [50] On private-key encryption using product codes
    Sun, HM
    COMPUTERS & ELECTRICAL ENGINEERING, 1999, 25 (06) : 439 - 450