Efficient Fuzzy Vault Based on Pairing and Its Application to Fingerprint Encryption

被引:0
作者
Fu Bo [1 ]
Li Jianping [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
来源
CHINESE JOURNAL OF ELECTRONICS | 2010年 / 19卷 / 02期
关键词
Data security; Biometric cryptosystem; Pairing-based cryptography; Fuzzy vault; Fingerprint;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Fuzzy vault (FV) scheme, proposed by Juels and Sudan, is intended to develop new concepts to bind cryptographic security into biometric authentication to improve security and protect privacy. But FV is vulnerable to some attacks, such as Attacks via record multiplicity or correlation attacks, Surreptitious key-inversion attack and Blended substitution attacks. In this paper, a novel biometric encryption scheme, named Efficient fuzzy vault (EFV), is developed using pairing-based cryptography. EFV scheme provides a higher level of security than FV as adopting random points instead of chaff points to resist the attacks that FV has difficulty to overcome. In addition, a complete implementation procedure of fingerprint-based EFV, based on the automatic alignment of minutiae converted in polar coordinates using a reference point, is developed. The security analysis and experiment results show that EFV is a promising scheme for biometric encryption.
引用
收藏
页码:249 / 255
页数:7
相关论文
共 18 条
  • [1] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [2] Clancy T.C., 2003, P 2003 ACM SIGMM WOR, P45
  • [3] Entropy analysis and new constructions of biometric key generation systems
    Golic, Jovan Dj.
    Baltatu, Madalina
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (05) : 2026 - 2040
  • [4] On-line fingerprint verification
    Jain, A
    Hong, L
    Bolle, R
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1997, 19 (04) : 302 - 314
  • [5] Biometrics: A tool for information security
    Jain, Anil K.
    Ross, Arun
    Pankanti, Sharath
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (02) : 125 - 143
  • [6] A fuzzy vault scheme
    Juels, A
    Sudan, M
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2006, 38 (02) : 237 - 257
  • [7] KHOLMATOV A, 2008, P SEC FOR STEG WAT M, V6819
  • [8] LI Q, 2008, CHINESE J ELECTRON, P99
  • [9] Lynn B., PAIRING BASED CRYPTO
  • [10] Miller VictorS., 1986, Short programs for functions on elliptic curves