Improved Security for Fuzzy Fingerprint Vault Using Secret Sharing over a Security Token and a Server |
Choi, Han-Na
(Department of Computer and Information Science, Korea University)
Lee, Sung-Ju (Department of Computer and Information Science, Korea University) Moon, Dae-Sung (Biometrics Technology Research Team, ETRI) Choi, Woo-Yong (Biometrics Technology Research Team, ETRI) Chung, Yong-Wha (Department of Computer and Information Science, Korea University) Pan, Sung-Bum (Department of Control, Instrument and Robot Engineering, Chosun University) |
1 | Fingerprint Verification Competition(FVC 2002), http://bias.csr.unibo.it/fvc2002 |
2 | U. Uludag, S. Pankanti, and A. Jain, "Fuzzy Vault for Fingerprints," International Conference on Audio- and Video-Based Biometric Person Authentication 2005, LNCS 3546, pp. 310-319, June 2005 |
3 | "Studies in Secure Multi-Party Computation and Applications," Ph.D. Thesis, The Weizmann Institute of Science, June 1995 |
4 | J. Jeffers and A. Arakala, "Minutiae-based Structures for a Fuzzy Vault," Biometrics ymposium, pp. 1-6, Aug. 2006 |
5 | H. Kikuchi, Y. Onuki, and K. Nagai, "Evaluation and Implement of Fuzzy Vault Scheme using Indexed Minutiae," IEEE International Conference on Systems, Man and Cybernetics, pp. 3709-3712, Oct. 2007 |
6 | Y. Chung, D. Moon, S. Lee, S. Jung, T. Kim, and D. Ahn, "Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault," Conference on Information Security and Cryptology 2005, LNCS 3822, pp. 358-369, Dec. 2005 |
7 | A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979 DOI ScienceOn |
8 | T. Clancy, N. Kiyayash, and D. Lin, "Secure Smartcard-based Fingerprint Authentication," ACM SIGMM workshop on Biometrics methods and applications 2003, pp. 45-52, Nov. 2003 DOI |
9 | U. Uludag, S. Pankanti, S. Prabhakar, and A.K. Jain, "Biometric Cryptosystems: Issues and Challenges," IEEE, vol. 92, no. 6, pp. 948-960, June 2004 DOI |
10 | A. Juels and M. Sudan, "A Fuzzy Vault Scheme," IEEE International Symposium on nformation Theory, pp. 408, Nov. 2002 |