首页> 外文期刊>IEEE transactions on dependable and secure computing >Secure Secret Sharing Enabled b-band Mini Vaults Bio-Cryptosystem for Vectorial Biometrics
【24h】

Secure Secret Sharing Enabled b-band Mini Vaults Bio-Cryptosystem for Vectorial Biometrics

机译:安全秘密共享支持的B频段Mini Vaults for View-Biometrics生物密码系统

获取原文
获取原文并翻译 | 示例

摘要

Biometric Cryptosystems for secret binding such as fuzzy vault and fuzzy commitment are provable secure and offers a convenient way for secret management and protection. Despite numerous practical schemes have been reported, they are deficient in resisting several security and privacy attacks. In this paper, we propose a novel bio-cryptosystem that based on the three key ingredients namely Index of Maximum (IoM) hashing, om; kTHORN threshold secret sharing and b- band mini vaults notion. The IoM hashing is motivated from the ranking based Locality Sensitive Hashing theory meant for non-invertible transformation. On the other hand, the om; kTHORN threshold secret sharing scheme and the b- band mini vaults manage overcome inherent limitations of biometric cryptosystems when integrated with IoM hashing. The proposed scheme strikes the balance between performance and the privacy/ security protection. Unlike fuzzy vault and fuzzy commitment, which primarily devised for unordered and binary biometrics, respectively, our scheme is tailored for feature vector-based biometrics (vectorial biometrics). Comprehensive experiments on fingerprint vectors that derived from several FVC fingerprint benchmarks and rigorous analysis demonstrate decent secret retrieval performance yet offer strong resilience against six major security and privacy attacks.
机译:用于秘密绑定的生物统计密码系统,如模糊拱顶和模糊承诺,可提供安全,并提供秘密管理和保护的便捷方式。尽管报告了许多实用方案,但它们缺乏抵制若干安全和隐私攻击。在本文中,我们提出了一种基于三个关键成分的新型生物密码系统,即最大(IOM)散列的指标,OM; kthorn阈值秘密共享和B-频段迷你拱顶概念。 IOM散列是从排名的基于排名的地区敏感散列理论的激励,以实现不可逆转的转换。另一方面,OM; Kthorn Threshold秘密共享方案和B-频段Mini Vaults管理与IOM散列集成时生物识别密码系统的固有限制。拟议计划袭击了绩效与隐私/安全保护之间的平衡。与模糊拱顶和模糊承诺不同,主要针对无序和二进制生物测量学分别设计,我们的计划是为基于传感器的生物识别(矢量生物识别性)量身定制的。源自几种FVC指纹基准和严格分析的指纹矢量的综合实验表明了体面的秘密检索性能,但却为六个主要安全和隐私攻击提供了强烈的恢复力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号