Browse > Article
http://dx.doi.org/10.3837/tiis.2016.09.030

A Novel Key Sharing Fuzzy Vault Scheme  

You, Lin (School of Cmmunication Engineering, Hangzhou Dianzi University)
Wang, Yuna (School of Cmmunication Engineering, Hangzhou Dianzi University)
Chen, Yulei (School of Cmmunication Engineering, Hangzhou Dianzi University)
Deng, Qi (School of Cmmunication Engineering, Hangzhou Dianzi University)
Zhang, Huanhuan (School of Cmmunication Engineering, Hangzhou Dianzi University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.9, 2016 , pp. 4585-4602 More about this Journal
Abstract
A novel key sharing fuzzy vault scheme is proposed based on the classic fuzzy vault and the Diffie-Hellman key exchange protocol. In this proposed scheme, two users cooperatively build their fuzzy vault for their shared key using their own biometrics. Either of the users can use their own biometrics to unlock the fuzzy vault with the help of the other to get their shared key without risk of disclosure of their biometrics. Thus, they can unlock the fuzzy vault cooperatively. The security of our scheme is based on the security of the classic fuzzy vault scheme, one-way hash function and the discrete logarithm problem in a given finite group.
Keywords
Fuzzy vault; Diffie-Hellman key exchange; finite group; biometrics; polynomial interpolation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Juels and M. Sudan, “A fuzzy vault scheme,” Designs, Codes, and Cryptography, vol. 38, no. 2, pp. 237-257, February, 2006. Article (CrossRef Link)   DOI
2 U. K. Sorger, “A new reed-solomon code decoding algorithm based on newton's interpolation,” IEEE Transactions on Information Theory, vol. 39, no. 2, pp. 358-365, March, 1993. Article (CrossRef Link)   DOI
3 L. You and J. Lu, “A novel fuzzy vault scheme for secret key exchange,” in Proc. Of International Symposium Conference on Security & Cryptography (SECRYPT), pp. 426-429, July 24-27, 2012. Article (CrossRef Link)
4 L. You, M. S. Fan, J. Lu, S. G. Wang and F. H. Li, “A key sharing fuzzy vault scheme,” Lecture Notes in Computer Science, vol. 7618, pp. 453-460, October 29-31, 2012. Article (CrossRef Link)
5 T. H. Nguyen, Y. Wang, T. N. Nguyen and R. Li, “A fingerprint fuzzy vault scheme using a fast chaff point generation algorithm,” in Proc. of IEEE Signal Processing, Communication and Computing, pp. 1-6, Aug. 5-8, 2013. Article (CrossRef Link)
6 T. T. L. Vo, T. K. Dang and J. Küng, “A hash-based index method for securing biometric fuzzy vaults. Trust, Privacy, and Security in Digital Business,” Lecture Notes in Computer Science, vol. 8647, pp. 60-71, Sept. 2-3, 2014. Article (CrossRef Link)
7 A. Juels and M. Sudan, “A fuzzy vault scheme,” in Proc. Of IEEE International Symposium on Information Theory (ISIT), pp. 408, June 30-July 5, 2002. Article (CrossRef Link)
8 W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, November, 1976. Article (CrossRef Link)   DOI
9 V. Guruswami and M. Sudan, “Improved deconding of reed-solomon and algebraic-geometric codes,” IEEE Transactions on Information Theory, vol. 45, no. 6, pp. 1757-1767, September, 1999. Article (CrossRef Link)   DOI
10 B. Yanikoglu and A. Kholmatov, “Combining multiple biometrics to protect privacy,” in Proc. of ICPR-BCTP Workshop, pp. 43-46, Aug. 5-8, 2004: 43-46. Article (CrossRef Link)
11 N. T. T. Huyen, M. Jo, T. D. Nguyen and E. N. Huh, “A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks,” Security and Communication Networks, vol.5, no.5 pp.485-495, May 2012. Article (CrossRef Link)   DOI