DocumentCode :
1802686
Title :
Key Binding Based on Biometric Shielding Functions
Author :
Huixian, Li ; Man, Wang ; Liaojun, Pang ; Weidong, Zhang
Author_Institution :
Sch. of Comput. Sci. & Eng., Northwestern Polytech. Univ., Xi´´an, China
Volume :
1
fYear :
2009
fDate :
18-20 Aug. 2009
Firstpage :
19
Lastpage :
22
Abstract :
The tremendous evolution in networking, communication and mobility creates greater security assurance demand than can be provided by simple security measures, such as requiring passwords to gain access to a system. Biometric technologies are being used increasingly as an effective means. The combination of biometrics and cryptography is promising although there are some issues to be addressed. The key issue of the biometric encryption is how to deal with the contradiction about the veracity of cryptography and the simulation of biometric. The shielding function is a potential tool to solve this problem. In this paper, we shall review and analyze the classic biometrics-based cryptographic key management. And then, we construct a new fingerprint-based key binding scheme by using the shielding function and the WFMT method.
Keywords :
biometrics (access control); cryptography; WFMT method; biometric encryption; biometric shielding function; biometric simulation; cryptographic key management; fingerprint-based key binding scheme; Application software; Biometrics; Communication system security; Computer science education; Cryptography; Fingerprint recognition; Information security; Iris; Laboratories; Military computing; Shielding Function; biometric encryption; fingerprint; key binding;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security, 2009. IAS '09. Fifth International Conference on
Conference_Location :
Xian
Print_ISBN :
978-0-7695-3744-3
Type :
conf
DOI :
10.1109/IAS.2009.305
Filename :
5283234
Link To Document :
بازگشت