CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Communications of the ACM
UNIX Password Security - Ten Years Later
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Verifiable secret sharing and achieving simultaneity in the presence of faults
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
The design of fingerprint vault based IC card access control system
EHAC'06 Proceedings of the 5th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
Hi-index | 0.00 |
By adopting a non-interactive information-theoretic secure verifiable secret sharing scheme in an unorthodox way, a verifiable fingerprint vault scheme is presented in this paper. Fuzzy vault scheme is a novel cryptographic construct which can increase the security of the biometric template in a biometric authentication system. It can be also used to bind the cryptographic key and the user in a cryptosystem to overcome the security problems caused by the key stolen, key illegally shared, etc. The main weakness of the scheme is the computation complexity is too high for the legitimate user to unlock the vault. In this paper, a verifiable fingerprint vault is proposed to improve the fuzzy vault scheme. It is shown that our scheme is effective.