{"title":"基于函数最小化的生物识别/密码密钥绑定","authors":"D. Riccio, Clemente Galdi, R. Manzo","doi":"10.1109/SITIS.2016.31","DOIUrl":null,"url":null,"abstract":"Traditional cryptosystems are based on the possession of secret keys that can be stolen or shared by non legitimate users. On the other hand, binding the real identity of a system user to what he is instead of something he knows or possesses is the main desirable property of biometric systems. Biometric Crypto-Systems (or BCSs) are designed to bind a cryptographic key with a biometric template to ensure that only a legitimate user can access to encrypted data. In this paper, we propose a new biometric cryptosystem that reformulates the binding process as a minimization problem in such a way that the cryptographic key cannot be derived from the parameters of the objective functions unless the system is provided with a valid biometric template. The idea this method is based on is quite novel and unexplored, and shows the advantage of being robust to attacks that commonly break some of the existing approaches. Moreover, unlike most of biometric crypto-systems, it doesn't need any error correction code technique. The paper formally discusses about the security of the system by evaluating the probability of an attacker to retrieve the correct cryptographic key, while experimental results show the efficiency and the effectiveness of the binding process by measuring the system performance in terms of accuracy, computational time and storage requirements.","PeriodicalId":403704,"journal":{"name":"2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Biometric/Cryptographic Keys Binding Based on Function Minimization\",\"authors\":\"D. Riccio, Clemente Galdi, R. Manzo\",\"doi\":\"10.1109/SITIS.2016.31\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Traditional cryptosystems are based on the possession of secret keys that can be stolen or shared by non legitimate users. On the other hand, binding the real identity of a system user to what he is instead of something he knows or possesses is the main desirable property of biometric systems. Biometric Crypto-Systems (or BCSs) are designed to bind a cryptographic key with a biometric template to ensure that only a legitimate user can access to encrypted data. In this paper, we propose a new biometric cryptosystem that reformulates the binding process as a minimization problem in such a way that the cryptographic key cannot be derived from the parameters of the objective functions unless the system is provided with a valid biometric template. The idea this method is based on is quite novel and unexplored, and shows the advantage of being robust to attacks that commonly break some of the existing approaches. Moreover, unlike most of biometric crypto-systems, it doesn't need any error correction code technique. The paper formally discusses about the security of the system by evaluating the probability of an attacker to retrieve the correct cryptographic key, while experimental results show the efficiency and the effectiveness of the binding process by measuring the system performance in terms of accuracy, computational time and storage requirements.\",\"PeriodicalId\":403704,\"journal\":{\"name\":\"2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)\",\"volume\":\"51 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SITIS.2016.31\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SITIS.2016.31","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Biometric/Cryptographic Keys Binding Based on Function Minimization
Traditional cryptosystems are based on the possession of secret keys that can be stolen or shared by non legitimate users. On the other hand, binding the real identity of a system user to what he is instead of something he knows or possesses is the main desirable property of biometric systems. Biometric Crypto-Systems (or BCSs) are designed to bind a cryptographic key with a biometric template to ensure that only a legitimate user can access to encrypted data. In this paper, we propose a new biometric cryptosystem that reformulates the binding process as a minimization problem in such a way that the cryptographic key cannot be derived from the parameters of the objective functions unless the system is provided with a valid biometric template. The idea this method is based on is quite novel and unexplored, and shows the advantage of being robust to attacks that commonly break some of the existing approaches. Moreover, unlike most of biometric crypto-systems, it doesn't need any error correction code technique. The paper formally discusses about the security of the system by evaluating the probability of an attacker to retrieve the correct cryptographic key, while experimental results show the efficiency and the effectiveness of the binding process by measuring the system performance in terms of accuracy, computational time and storage requirements.