Abstract
Based on the classical fuzzy vault and the Diffie-Hellman key exchange scheme, a key sharing fuzzy vault scheme is proposed. In this fuzzy vault scheme, the two users cooperatively build their shared fuzzy vault with a shared key hidden in it using their own biometric features, and they can respectively use their biometric features to unlock the fuzzy vault to get their shared key without running the risk of disclosure of their biometric features later. The security of our scheme is based on the security of the classical fuzzy vault scheme and and the discrete logarithm problem in a given finite group.
Chapter PDF
Similar content being viewed by others
References
Juels, A., Sudan, M.: A fuzzy vault scheme. In: IEEE International Symposium on Information Theory (ISIT), p. 408. IEEE Press, Lausanne (2002)
Juels, A., Sudan, M.: A fuzzy vault scheme. Designs, Codes, and Cryptography 38(2), 237–257 (2006)
Sorger, U.K.: A New Reed-Solomon Code Decoding Algorithm Based on Newton’s Interpolation. IEEE Transactions on Information Theory 39(2), 358–365 (1993)
Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy Vault for Fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)
Guruswami, V., Sudan, M.: Improved deconding of Reed-Solomon and Algebraic-Geometric codes. IEEE Transactions on Information Theory 45(6), 1757–1767 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
You, L., Fan, M., Lu, J., Wang, S., Li, F. (2012). A Key Sharing Fuzzy Vault Scheme. In: Chim, T.W., Yuen, T.H. (eds) Information and Communications Security. ICICS 2012. Lecture Notes in Computer Science, vol 7618. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34129-8_44
Download citation
DOI: https://doi.org/10.1007/978-3-642-34129-8_44
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34128-1
Online ISBN: 978-3-642-34129-8
eBook Packages: Computer ScienceComputer Science (R0)