Skip to main content

Soft Generation of Secure Biometric Keys

  • Conference paper
Information Security and Privacy (ACISP 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4586))

Included in the following conference series:

Abstract

A new, soft two-level approach for the generation of multiple and revocable biometric keys, adapted to the analog nature of biometric signals, is proposed. It consists of a novel soft code-offset construction for the Euclidean metric, applied at the first level, and a code-redundancy construction for the Hamming metric, preferably based on a Reed-Solomon code, applied at the second level. The Shannon entropy analysis shows that the new construction achieves maximal possible security. It is also shown that the previously proposed constructions for the Euclidean metric are vulnerable to biometric template reconstruction in the multiple-key scenario.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boyen, X.: Reusable cryptographic fuzzy extractors. In: Proc. 11th ACM Conference on Computer and Communications Security, pp. 82–91 (2004)

    Google Scholar 

  2. Chang, E.-C., Li, Q.: Hiding secret points amidst chaff. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 59–72. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Chor, B., Kushilevitz, E.: Secret sharing over infinite domains. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 299–306. Springer, Heidelberg (1990)

    Google Scholar 

  4. Davida, G.I., Frankel, Y., Matt, B.J.: On enabling secure applications through off-line biometric identification. In: Proc. IEEE Symposium on Security and Privacy, pp. 148–157 (1998)

    Google Scholar 

  5. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)

    Google Scholar 

  6. Golić, J.Dj., Baltatu, M.: Entropy analysis and new constructions of biometric key generation systems (submitted)

    Google Scholar 

  7. Hao, F., Anderson, R., Daugman, J.: Combining cryptography with biometrics effectively, Technical Report UCAM-CL-TR-640, University of Cambridge (July 2005)

    Google Scholar 

  8. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proc. 6th ACM Conference on Computer and Communications Security, pp. 28–36 (1999)

    Google Scholar 

  9. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. Patent Application WO 00/51244 A1 (August 2000)

    Google Scholar 

  10. Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proc. IEEE International Symposium on Information Theory, p. 408 (2002)

    Google Scholar 

  11. Linnartz, J.-P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proc. 4th International Conference on Audio- and Video-Based Biometric Person Authentication, pp. 393–402 (2003)

    Google Scholar 

  12. Sundaresan, R.: Guessing under source uncertainty. IEEE Trans. Inform. Theory 53, 269–287 (2007)

    Article  Google Scholar 

  13. Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)

    Google Scholar 

  14. Wu, Y.D.: Method of using biometric information for secret generation. Patent Application WO 02/078249 A1 (March 2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Josef Pieprzyk Hossein Ghodosi Ed Dawson

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Golić, J.D., Baltatu, M. (2007). Soft Generation of Secure Biometric Keys. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds) Information Security and Privacy. ACISP 2007. Lecture Notes in Computer Science, vol 4586. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73458-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73458-1_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73457-4

  • Online ISBN: 978-3-540-73458-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics