A Symmetric Keyring Encryption Scheme for Biometric Cryptosystems

09/28/2018
by   Yen-Lung Lai, et al.
0

In this paper, we propose a novel biometric cryptosystem for vectorial biometrics named symmetric keyring encryption (SKE) inspired by Rivest's keyring model (2016). Unlike conventional biometric secret-binding primitives, such as fuzzy commitment and fuzzy vault, the proposed scheme reframes the biometric secret-binding problem as a fuzzy symmetric encryption problem with a notion called resilient vector pair. In this study, the pair resembles the encryption-decryption key pair in symmetric key cryptosystems. This notion is realized using the index of maximum hashed vectors - a special instance of the ranking-based locality-sensitive hashing function. With a simple filtering mechanism and [m,k] Shamir's secret-sharing scheme, we show that SKE, both in theoretical and empirical evaluation, can retrieve the exact secret with overwhelming probability for a genuine input yet negligible probability for an imposter input. Though SKE can be applied to any vectorial biometrics, we adopt the fingerprint vector as a case of study in this work. The experiments have been performed under several subsets of FVC 2002, 2004, and 2006 datasets. We formalize and analyze the threat model of SKE that encloses several major security attacks.

READ FULL TEXT

page 5

page 6

research
02/03/2021

Information-theoretic Key Encapsulation and its Application to Secure Communication

A hybrid encryption scheme is a public key encryption system that consis...
research
02/15/2019

A Somewhat Homomorphic Encryption Scheme based on Multivariate Polynomial Evaluation

We propose a symmetric key homomorphic encryption scheme based on the ev...
research
08/16/2022

An Adaptive Image Encryption Scheme Guided by Fuzzy Models

A new image encryption scheme using the advanced encryption standard (AE...
research
08/22/2007

The Fuzzy Vault for fingerprints is Vulnerable to Brute Force Attack

The fuzzy vault approach is one of the best studied and well accepted id...
research
03/16/2017

Ranking Based Locality Sensitive Hashing Enabled Cancelable Biometrics: Index-of-Max Hashing

In this paper, we propose a ranking based locality sensitive hashing ins...
research
11/03/2020

A novel group based cryptosystem based on electromagnetic rotor machine

In this paper, an algorithm is aimed to make a cryptosystem for gray lev...
research
03/13/2019

Learning Symmetric and Asymmetric Steganography via Adversarial Training

Steganography refers to the art of concealing secret messages within mul...

Please sign up or login with your details

Forgot password? Click here to reset