Abstract
A new, soft two-level approach for the generation of multiple and revocable biometric keys, adapted to the analog nature of biometric signals, is proposed. It consists of a novel soft code-offset construction for the Euclidean metric, applied at the first level, and a code-redundancy construction for the Hamming metric, preferably based on a Reed-Solomon code, applied at the second level. The Shannon entropy analysis shows that the new construction achieves maximal possible security. It is also shown that the previously proposed constructions for the Euclidean metric are vulnerable to biometric template reconstruction in the multiple-key scenario.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Boyen, X.: Reusable cryptographic fuzzy extractors. In: Proc. 11th ACM Conference on Computer and Communications Security, pp. 82–91 (2004)
Chang, E.-C., Li, Q.: Hiding secret points amidst chaff. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 59–72. Springer, Heidelberg (2006)
Chor, B., Kushilevitz, E.: Secret sharing over infinite domains. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 299–306. Springer, Heidelberg (1990)
Davida, G.I., Frankel, Y., Matt, B.J.: On enabling secure applications through off-line biometric identification. In: Proc. IEEE Symposium on Security and Privacy, pp. 148–157 (1998)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)
Golić, J.Dj., Baltatu, M.: Entropy analysis and new constructions of biometric key generation systems (submitted)
Hao, F., Anderson, R., Daugman, J.: Combining cryptography with biometrics effectively, Technical Report UCAM-CL-TR-640, University of Cambridge (July 2005)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proc. 6th ACM Conference on Computer and Communications Security, pp. 28–36 (1999)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. Patent Application WO 00/51244 A1 (August 2000)
Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proc. IEEE International Symposium on Information Theory, p. 408 (2002)
Linnartz, J.-P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proc. 4th International Conference on Audio- and Video-Based Biometric Person Authentication, pp. 393–402 (2003)
Sundaresan, R.: Guessing under source uncertainty. IEEE Trans. Inform. Theory 53, 269–287 (2007)
Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)
Wu, Y.D.: Method of using biometric information for secret generation. Patent Application WO 02/078249 A1 (March 2001)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Golić, J.D., Baltatu, M. (2007). Soft Generation of Secure Biometric Keys. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds) Information Security and Privacy. ACISP 2007. Lecture Notes in Computer Science, vol 4586. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73458-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-73458-1_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73457-4
Online ISBN: 978-3-540-73458-1
eBook Packages: Computer ScienceComputer Science (R0)