Recursive hiding of biometrics-based secret sharing scheme using adversary structure

  • Authors:
  • Hong Lai;Jinghua Xiao;Lixiang Li;Yixian Yang

  • Affiliations:
  • School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, China and Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, Ch ...;School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, China;Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China and National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of P ...;Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China and National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of P ...

  • Venue:
  • Information Processing Letters
  • Year:
  • 2012

Quantified Score

Hi-index 0.89

Visualization

Abstract

This paper first investigates the applications of recursive hiding of secret, which was originally proposed for visual cryptography to space efficient secret sharing, and then provides a novel recursive hiding of biometrics-based secret sharing scheme using adversary structure. The proposed scheme may find applications for sharing secrets with excess bits, especially in the scenarios where resources are strictly limited and the requirement of verification is demanding. Existing ways of combiner verification always just rely on exponentiation or only by hiring one-way hash function, which cannot thwart the stolen share attack, spoofing attack or discriminate an imposter who fraudulently obtains the access privileges from the genuine participant. Nonetheless, these problems can be tackled by the unique property of biometrics in our paper. Most importantly, unlike most counterpart schemes, no other random numbers are used to protect the secret pieces, hence, our scheme is simpler and more efficient, and the computation cost is relatively low.