会议专题

Key Binding Based on Biometric Shielding Functions

The tremendous evolution in networking,communication and mobility creates greater security assurance demand than can be provided by simple security measures, such as requiring passwords to gain access to a system. Biometric technologies are being used increasingly as an effective means. The combination of biometrics and cryptography is promising although there are some issues to be addressed. The key issue of the biometric encryption is how to deal with the contradiction about the veracity of cryptography and the simulation of biometric. The shielding function is a potential tool to solve this problem. In this paper, we shall review and analyze the classic biometrics-based cryptographic key management. And then, we construct a new fingerprintbased key binding scheme by using the shielding function and the WFMT method.

biometric encryption Shielding Function key binding fingerprint

Li Huixian Wang Man Pang Liaojun Zhang Weidong

School of Computer Science and Engineering Northwestern Polytechnical University,Xian,China Second Arillery Military Office in Li-Shan Microelectronics Company,Xian,China The Ministry of Education Key Laboratory of Comput.Networks and Information Security,Xidian Universi

国际会议

The Fifth International Conference on Information Assurance and Security(第五届信息保障与安全国际会议)

西安

英文

19-22

2009-08-18(万方平台首次上网日期,不代表论文的发表时间)