An Approach to Protect Private Key using Fingerprint Biometric Encryption Key in BioPKI based Security System

被引:7
|
作者
Nguyen Thi Hoang Lan [1 ]
Nguyen Thi Thu Hang [1 ]
机构
[1] Hanoi Univ Technol, Fac Informat Technol, Hanoi, Vietnam
来源
2008 10TH INTERNATIONAL CONFERENCE ON CONTROL AUTOMATION ROBOTICS & VISION: ICARV 2008, VOLS 1-4 | 2008年
关键词
Biometric Security System; Cryptography; Fingerprint; Biometric Encryption Key (BEK); BioPKI system; User Authentication; Verification; Biometric sample; Biometric template;
D O I
10.1109/ICARCV.2008.4795763
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In traditional Public Key Infrastructure (PKI) system, Private Key could be stored in central database or store distributed in smart-card and delivered to the users. The Private Key is usually protected by passwords that are easily guessed or stolen and thus lead to the collapse of the whole system. Current trend for PKI system is based on physiological and behavioral characteristics of persons, known as biometrics. This approach can increase the security of Private Key because in theory, the biometric features could not be guessed or forged. However, this approach still reveals a gap that is the vulnerability of storage device of Private Key and biometrics data. Malefactors can attack directly to these storage devices and steal user identification information. In this paper, we propose a solution that uses Biometric Encryption Key (BEK) to encrypt Private Key and protect Private Key in a secure way for both of two these kind of information. We also present the BEK generation algorithm and the BioPKI system to support this solution and then we illustrate the experimental results.
引用
收藏
页码:1595 / 1599
页数:5
相关论文
共 50 条
  • [21] Biometric Encryption using Fingerprint Fuzzy Vault for FPGA-based Embedded Systems
    Bakhteri, Rabia
    Hani, Mohamed Khalil
    TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 1618 - 1622
  • [22] A SECURE BSS-BASED ENCRYPTION SCHEME USING AES KEY EXPANSION APPROACH
    Okhovat, Raziyeh Sadat
    Sadr, Ali
    THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 277 - +
  • [23] A new public key cipher system based on image encryption
    Alam, MGR
    Hassan, MM
    Hossain, N
    Quadir, SMM
    Proceedings of the 8th Joint Conference on Information Sciences, Vols 1-3, 2005, : 1735 - 1738
  • [24] Improved SSL application using Session Key based Double Key Encryption/Decryption (SDKED)
    Kbar, G
    Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004, : 294 - 300
  • [25] Content based double encryption algorithm using symmetric key cryptography
    Chandra, Sourabh
    Mandal, Bidisha
    Alam, Sk Safikul
    Bhattacharyya, Siddhartha
    3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 1228 - 1234
  • [26] Message Security in P2P Network Using Distributed Private Key
    Patil, Pankaj R.
    Patil, D. R.
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [27] Public key authenticated encryption with multiple keywords search using Mamdani system
    Yang Ma
    Hassan Kazemian
    Evolving Systems, 2021, 12 : 687 - 699
  • [28] Public key authenticated encryption with multiple keywords search using Mamdani system
    Ma, Yang
    Kazemian, Hassan
    EVOLVING SYSTEMS, 2021, 12 (03) : 687 - 699
  • [29] Design and Implementation Biometric Access Control System Using Fingerprint for Restricted Area Based on Gabor Filter
    El-Sisi, Ashraf
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2011, 8 (04) : 355 - 363
  • [30] ID-based key exchange protocol using smart cards with fingerprint
    Bae, HJ
    Kim, HS
    Yoo, KY
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2003, : 448 - 452