Enhanced biometric encryption algorithm for private key protection in BioPKI system

Cheol-Joo Chae , Kwang-Nam Choi , Kiseok Choi , Jae-Soo Kim , YongJu Shin

Journal of Central South University ›› 2014, Vol. 21 ›› Issue (11) : 4286 -4290.

PDF
Journal of Central South University ›› 2014, Vol. 21 ›› Issue (11) : 4286 -4290. DOI: 10.1007/s11771-014-2426-1
Article

Enhanced biometric encryption algorithm for private key protection in BioPKI system

Author information +
History +
PDF

Abstract

Protection of private key is the most critical part in public key infrastructure (PKI) system since it depends on the confidentiality of private key. Thread of password detection has been known as the vulnerability in this PKI system. Recently, studies have been conducted on BioPKI system that uses the biometric information of users in order to replace the password type of private key protection in PKI system. However, BioPKI system also has vulnerability in that biometric information used for protection of private key cannot be reused once it is stolen or lost. So, we propose the method to protect the private key using FIDSEQi which binds sequence to biometric information. The proposed method enhances reusability of biometric information and presents higher attack complexity than the method of authentication by cross matching single biometric information.

Keywords

BioPKI system / fingerprint / biometric encryption / secret share

Cite this article

Download citation ▾
Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Jae-Soo Kim, YongJu Shin. Enhanced biometric encryption algorithm for private key protection in BioPKI system. Journal of Central South University, 2014, 21(11): 4286-4290 DOI:10.1007/s11771-014-2426-1

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

JainA K, RossA. Multibiometric systems [J]. Journal Communications of the ACM, 2004, 47(1): 34-40

[2]

DrahanskýMBiometric security system fingerprint recognition technology. [D], 2005, Czech Republic, Brno University of Technology

[3]

RathgebC, UhlA. A survey on biometric cryptosystems and cancelable biometrics [J]. EURA-SIP Journal on Information Security, 2011, 1: 1-25

[4]

LanN T H, DucT Q, HoanN T. A biometrics encryption key algorithm to protect private key in BioPKI based security system [C]. Proceeding of ICICS 2009 (IEEE 7th International Conference on Information, Communications and Signal Processing). Macau, 20098-10

[5]

ChungY, MoonK, LeeH-Woo. Biometric certificate based biometric digital key generation with protection mechanism [C]. Frontiers in the Convergence of Bioscience and Information Technologies, 2007, Jeju, FBIT: 709-714

[6]

SHAMIR. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613

[7]

MaM, ChenL, WangJ-ming. Research on cascade algorithm of new Bio-encryption technology [C]. 2011 International Conference on Control, Automation and Systems Engineering (CASE), 2011, Singapore, IEEE: 1-4

[8]

YOSHIFUMI UESHIGEA study on biometrics authentication in BioPKI [R], 2005, KYUSHU, Institute of Systems & Information Technologies

[9]

LanN T H, HangN T T. An approach to protect private key using fingerprint biometric encryption key in BioPKI based security system [C]. 10th International Conference on Control, Automation, Robotics and Vision (ICARCV 2008), 2008, Hanoi, IEEE: 1595-1599

[10]

ScheirerW, BishopB, BoultT. Beyond PKI: The Biocryptographic key infrastructure [C]. 2010 IEEE International Workshop on Information Forensics and Security (WIFS), 2010, Seattle, IEEE: 1-6

AI Summary AI Mindmap
PDF

135

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/