ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article Symmetric Keyring Encryption Scheme for Biometric Cryptosystem
Cited 18 time in scopus Download 5 time Share share facebook twitter linkedin kakaostory
Authors
Yen-Lung Lai, Jung Yeon Hwang, Zhe Jin, Soohyong Kim, Sangrae Cho, Andrew Beng Jin Teoh
Issue Date
2019-10
Citation
Information Sciences, v.502, pp.492-509
ISSN
0020-0255
Publisher
Elsevier
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.1016/j.ins.2019.05.064
Project Code
19HH5400, Developing blockchain identity management system with implicit augmented authentication and privacy protection for O2O services, Soo Hyung Kim
Abstract
In this paper, we propose a novel biometric cryptosystem for vectorial biometrics called symmetric keyring encryption (SKE), inspired by Rivest's keyring model (2016). Unlike conventional biometric secret-binding primitives, such as fuzzy commitment and fuzzy vault approaches, the proposed scheme reframes the biometric secret-binding problem as a fuzzy symmetric encryption problem using a concept called a resilient vector pair. In this study, this pair resembles the encryption?밺ecryption key pair in symmetric key cryptosystems. This scheme is realized using an index of maximum hashed vectors, a special instance of the ranking-based locality-sensitive hashing function. With a simple filtering mechanism and an [m, k] Shamir's secret-sharing scheme, we show that SKE, both in theory and in an empirical evaluation, can retrieve the exact secret with overwhelming probability for a genuine input yet negligible probability for an imposter input. Although SKE can be applied to any vectorial biometrics, we adopt fingerprint and face vectors in this work. Experiments were performed using the Fingerprint Verification Competition (FVC) and Labeled Face in the Wild (LFW) datasets. We formalize and analyze the threat model for SKE, which involves several major security attacks.
KSP Keywords
Biometric cryptosystem, Empirical Evaluation, Encryption Scheme, Fingerprint Verification, Fuzzy commitment, Fuzzy vault, Hashing Function, Key pair, Locality sensitive hashing, Ranking-based, Secret sharing scheme