The combination of biometrics and cryptography have consistently remained an open problem due to the probabilistic nature of the former and the deterministic nature of the latter. Various fuzzy cryptosystem schemes have arisen in hopes of combining primitives for both disciplines, mostly for practical purposes. In cryptographic primitives, particularly the digital signature, most of the fuzzy signature schemes rely on the fuzzy extractor to generate keys for the algorithm. It is claimed that said schemes can be readily used with biometric inputs due to their fuzzy nature. In our proposed work which we coin the Fuzzy MP scheme, we use an approach different from the fuzzy extractor for a fuzzy signature scheme. The Fuzzy MP selects the keys independently from the biometric input, while the biometric inputs are actively involved in the signature generation. As a proof-of-concept of using biometric inputs, experiments on face biometrics have been conducted. The Fuzzy MP relies on a biometric template protection scheme, and a cryptographic attribute-based credential system based on the monic polynomial for signature generation. The signature and verification processes both are dependent on the pairing protocol of Elliptic Curve Cryptography.
|Title of host publication||Mobile Networks and Management - 11th EAI International Conference, MONAMI 2021, Proceedings|
|Editors||Carlos T. Calafate, Xianfu Chen, Yuan Wu|
|Publisher||Springer Science and Business Media Deutschland GmbH|
|Number of pages||17|
|Publication status||Published - 2022|
|Event||11th EAI International Conference on Mobile Networks and Management, MONAMI 2021 - Virtual, Online|
Duration: 2021 Oct 27 → 2021 Oct 29
|Name||Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST|
|Conference||11th EAI International Conference on Mobile Networks and Management, MONAMI 2021|
|Period||21/10/27 → 21/10/29|
Bibliographical noteFunding Information:
Acknowledgements. This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (NO. NRF-2019R1A2C1003306). The authors would also like to thank Syh-Yuan Tan and Thomas Groß for their helpful advice during the implementation of the MoniPoly scheme.
© 2022, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications