Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Handbook of Applied Cryptography
Handbook of Applied Cryptography
IEEE Transactions on Pattern Analysis and Machine Intelligence
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Foundations of Cryptography: Volume 1
Foundations of Cryptography: Volume 1
New constructions of fuzzy identity-based encryption
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
EURASIP Journal on Advances in Signal Processing
A Novel Fuzzy Identity-Based Signature with Dynamic Threshold
NSS '09 Proceedings of the 2009 Third International Conference on Network and System Security
Cancelable fingerprint templates using minutiae-based bit-strings
Journal of Network and Computer Applications
Pair-polar coordinate-based cancelable fingerprint templates
Pattern Recognition
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
New directions in cryptography
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Fuzzy identity-based identification (FIBI) scheme is a recently proposed cryptographic identification protocol. The scheme utilizes user biometric trait as public keys. The authentication is deemed success in the presence of the genuine query biometric together with the valid private key. Because of the fuzziness nature of biometrics, FIBI does not correct the errors on the query biometric with respect to the public key; instead, it tolerates the errors using Lagrange polynomial interpolation. Therefore, FIBI requires the biometric trait to be represented in a discrete (binary or integer) array that is fixed in length. In this paper, we report the first realization of FIBI scheme by means of fingerprint biometrics using minutia representation where our technique integrates the security features of both biometric and cryptography effectively. The simulation shows that the entire protocol can be completed within 1 s where false acceptance rate (FAR) = 0% and false reject rate (FRR) = 0.25% in FVC2002 DB1, and FAR = 0% and FRR = 0.125% in FVC2002 DB2. Our integration technique may also be applied on other fuzzy identity-based cryptosystems. Copyright © 2012 John Wiley & Sons, Ltd.