期刊文献+

模糊保险箱的多项式表示方法 被引量:2

Polynomial Representation Method of Fuzzy Vault
下载PDF
导出
摘要 在模糊保险箱方案中,通常采用多个干扰点与用户特征点混合构成的集合表示保险箱,这种方法存在多种安全缺陷。为此,提出一种新的保险箱构造方案,该方案利用随机点与用户特征集合构造一个随机多项式,运用该多项式系数表示保险箱。分析结果表明,该方案可以抵抗已知的对模糊保险箱的多种攻击,具有更高的安全性,并能节约存储空间。 In fuzzy vault scheme,a set with genuine points of a user mixed with a lot of chaff points represents a vault.However,there are some secure flaws in this scheme.To solve these problems,a novel scheme is presented to construct a vault,in which a random polynomial instead of a set is used to represent the vault.Theoretical analysis results show that the new scheme can defeat the existed attacks.It needs less memory than that in the original scheme.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第23期147-148,151,共3页 Computer Engineering
基金 国家自然科学基金资助项目(61062012)
关键词 模糊保险箱 多项式 生物模板保护 生物识别 指纹细节点 fuzzy vault polynomial biometric template protection biometrics minutiae
  • 相关文献

参考文献9

  • 1冯全,苏菲,蔡安妮.生物加密综述[J].计算机工程,2008,34(10):141-143. 被引量:10
  • 2Juels A, Wattenberg M. A Fuzzy Commitment Scheme[C]//Proc. of the 6th ACM Conf. on Computer and Communication Security. New York, USA: ACM Press, 1999. 被引量:1
  • 3Juels A, Wattenberg M. A Fuzzy Vault Scheme[C]//Proc. of IEEE Int'l Symp. on Information Theory. [S. l.]: IEEE Press, 2002. 被引量:1
  • 4Dodis Y, Ostrovsky R, Reyzin L, et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data[C]// Proc. of EUROCRYPT'04. Berlin, Germany: [s. n.], 2004. 被引量:1
  • 5Scheirer W, Boult T. Cracking Fuzzy Vaults and Biometric Encryption[EB/OL]. (2007-01-14). http://vast.uccs.edu/-tboult/ PAPERS/Scheirer-Boult-BCC07-Crack-Fuzzy-Vault.pdf. 被引量:1
  • 6Socek D, Culibrk D. Practical Secure Biometrics Using Set Intersection as a Similarity Measure[C]//Proc. of Int'l Conf. on Security and Cryptography. Barcelona, Spain: [s. n.], 2007. 被引量:1
  • 7Feng Quan,Su Fei,Cai Anni.FINGERPRINT-BASED KEY BINDING/RECOVERING SCHEME BASED ON FUZZY VAULT[J].Journal of Electronics(China),2008,25(3):415-421. 被引量:4
  • 8Uludag U, Pankanti S, Jain A. Fuzzy Vault for Fingerprints[C]// Proc. of AVBPA'05. New York, USA: [s. n.], 2005. 被引量:1
  • 9Shoup V. A Computational Introduction to Number Theory(V1)[EB/OL]. [2003-10-13]. http://www.shoup.net/ntb/. 被引量:1

二级参考文献29

  • 1Uludag U,Pankanti S,Prabhakar S,et al.Biometric Cryptosystems:Issues and Challenges[C]//Proc.of IEEE Conference on Multimedia Information Retrieval.[S.l.]:IEEE Press,2004. 被引量:1
  • 2Nichols P K.ICSA Guide to Cryptography[M].[S.l.]:McGraw-Hill Companies,1998. 被引量:1
  • 3Adler A.Vulnerabilities in Biometric Encryption Systems[C]//Proc.of Audio-and Video-based Biometric Person Authentication 2005.New York,USA:[s.n.],2005. 被引量:1
  • 4Davida G I,Frankel Y Matt B J.On Enabling Secure Applications Through Off-line Biometric Identification[C]//Proc.of 1998 IEEE Symp.on Security and Privacy.Oakland,California,USA:[s.n.],1998. 被引量:1
  • 5Juels A,Wattenberg M.A Fuzzy Commitment Scheme[C]//Proc.of the 6th ACM Conference on Computer and Communications Secufity.Singapore:[s.n.],1999. 被引量:1
  • 6Feng Hao,Anderson R,Daugman J.Combining Crypto with Biometrics Effectively[J].IEEE Transactions on Computers,2006,55(9):1081-1088. 被引量:1
  • 7Juels A,Sudan M.A Fuzzy Vault Scheme[C]//Proc.of IEEE International Symp.on Information Theory.Lausanne,Switzerland:[s.n.],2002. 被引量:1
  • 8Uludag U,Pankanti S.Jain A.Fuzzy Vault for Fingerprints[C]//Proc.of Audio-and Video-based Biometric Person Authentication 2005.New York,USA:[s.n.],2005. 被引量:1
  • 9Walter J S,Terrance E B.Cracking Fuzzy Vaults and Biometric Encryption[EB/OL].(2007-06-20).vast.uccs.edu/~tboult/PAPERS/Scheirer-Boult-BCC07-Crack-Fuzzy-Vault.pdf. 被引量:1
  • 10Dodis Y,Reyzin L,Smith A.Fuzzy Extractors:How to Generate Strong Keys from Biometrics and Other Noisy Data[C]//Proc.of Euroerypt 2004 International Conference on the Theory and Applications of Cryptographic Techniques.Interlaken,Switzerland:[s.n.],2004. 被引量:1

共引文献12

同被引文献8

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部