An Approach to Protect Private Key using Fingerprint Biometric Encryption Key in BioPKI based Security System

被引:7
|
作者
Nguyen Thi Hoang Lan [1 ]
Nguyen Thi Thu Hang [1 ]
机构
[1] Hanoi Univ Technol, Fac Informat Technol, Hanoi, Vietnam
来源
2008 10TH INTERNATIONAL CONFERENCE ON CONTROL AUTOMATION ROBOTICS & VISION: ICARV 2008, VOLS 1-4 | 2008年
关键词
Biometric Security System; Cryptography; Fingerprint; Biometric Encryption Key (BEK); BioPKI system; User Authentication; Verification; Biometric sample; Biometric template;
D O I
10.1109/ICARCV.2008.4795763
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In traditional Public Key Infrastructure (PKI) system, Private Key could be stored in central database or store distributed in smart-card and delivered to the users. The Private Key is usually protected by passwords that are easily guessed or stolen and thus lead to the collapse of the whole system. Current trend for PKI system is based on physiological and behavioral characteristics of persons, known as biometrics. This approach can increase the security of Private Key because in theory, the biometric features could not be guessed or forged. However, this approach still reveals a gap that is the vulnerability of storage device of Private Key and biometrics data. Malefactors can attack directly to these storage devices and steal user identification information. In this paper, we propose a solution that uses Biometric Encryption Key (BEK) to encrypt Private Key and protect Private Key in a secure way for both of two these kind of information. We also present the BEK generation algorithm and the BioPKI system to support this solution and then we illustrate the experimental results.
引用
收藏
页码:1595 / 1599
页数:5
相关论文
共 50 条
  • [41] High-Security Transmission Scheme of Secure Key Generation and Distribution Based on Polling-Permutation Encryption
    Xia, Wenchao
    Liu, Bo
    Ren, Jianxin
    Mao, Yaya
    Wu, Xiangyu
    Ullah, Rahat
    Zhao, Lilong
    Chen, Shuaidong
    Wan, Yibin
    Ma, Yiming
    Li, Ying
    Qi, Zhipeng
    Wu, Yongfong
    Guo, Xuzhou
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2024, 42 (01) : 149 - 157
  • [42] Fingerprint-Based Asymmetric Bio-Cryptographic Key Generation Using Convolution Network
    Maiti, Diptadip
    Basak, Madhuchhanda
    Das, Debashis
    FOURTH CONGRESS ON INTELLIGENT SYSTEMS, VOL 2, CIS 2023, 2024, 869 : 29 - 49
  • [43] Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system
    Khan, Majid
    Masood, Fawad
    Alghafis, Abdullah
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (15) : 11837 - 11857
  • [44] Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system
    Majid Khan
    Fawad Masood
    Abdullah Alghafis
    Neural Computing and Applications, 2020, 32 : 11837 - 11857
  • [45] A Hybrid Template Protection Approach using Secure Sketch and ANN for Strong Biometric Key Generation with Revocability Guarantee
    Tran-Khanh Dang
    Van-Quoc-Phuong Huynh
    Hai Truong
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (02) : 331 - 340
  • [46] A secured cryptographic system based on DNA and a hybrid key generation approach
    Reddy, M. Indrasena
    Kumar, A. P. Siva
    Reddy, K. Subba
    BIOSYSTEMS, 2020, 197
  • [47] Cancelable electrocardiogram biometric system based on chaotic encryption using three-dimensional logistic map for biometric-based cloud services
    Eldesouky, Samer
    El-Shafai, Walid
    Ahmed, Hossam El din H.
    Abd El-Samie, Fathi E.
    SECURITY AND PRIVACY, 2022, 5 (02):
  • [48] Image encryption using a 3D modular hybrid chaotic system and CRC key generator
    Darani, A. Yousefian
    Yengejeh, Y. Khedmati
    Hosseinzadeh, R.
    Pakmanesh, H.
    JOURNAL OF OPTICS-INDIA, 2024,
  • [49] Cybersecurity-Enhanced Encrypted Control System Using Keyed-Homomorphic Public Key Encryption
    Miyamoto, Masaki
    Teranishi, Kaoru
    Emura, Keita
    Kogiso, Kiminao
    IEEE ACCESS, 2023, 11 : 45749 - 45760
  • [50] More efficient key-hash based fingerprint remote authentication scheme using mobile device
    Muhammad Khurram Khan
    Saru Kumari
    Mridul K. Gupta
    Computing, 2014, 96 : 793 - 816