{"title":"基于超椭圆曲线和密码安全随机数的生物特征签名加密","authors":"K. Sathya, V. Rajasekar, J. Premalatha","doi":"10.1109/ICRTIT.2016.7569557","DOIUrl":null,"url":null,"abstract":"The biometric system stores physiological traits of user such as finger print, iris, palm, patterns of veins etc. Iris signcryption is the most successful way to improve the information security because iris consists of most accurate features compared to other authentication systems. In order to provide better security and less computational time lightweight cryptographic scheme called signcryption has introduced. Signcryption is a logical combination of encryption and signature. Cryptographically secure random numbers are used as private key in encryption segment and as key in generating signature of SHA-1 segment. Generally the random numbers passing the NIST Test suite fails to satisfy cryptographically secure requirements. An approach called twining technique along with AES in counter mode is used to generate cryptographically random numbers from the seed values of sensors. Twining technique is a novel method to minimize co linearity that occurs while extracting seed from multiple sensors housed in same environment. One of the most recent researches in the area of public key cryptography is HyperElliptic Curve Cryptography (HECC) because HECC uses smaller key size and less computational time. In the proposed biometric signcryption, biometric data, HECC and cryptographically secure random numbers are used to derive the signcrypted value of iris.","PeriodicalId":351133,"journal":{"name":"2016 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Biometric signcryption using hyperelliptic curve and cryptographically secure random number\",\"authors\":\"K. Sathya, V. Rajasekar, J. Premalatha\",\"doi\":\"10.1109/ICRTIT.2016.7569557\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The biometric system stores physiological traits of user such as finger print, iris, palm, patterns of veins etc. Iris signcryption is the most successful way to improve the information security because iris consists of most accurate features compared to other authentication systems. In order to provide better security and less computational time lightweight cryptographic scheme called signcryption has introduced. Signcryption is a logical combination of encryption and signature. Cryptographically secure random numbers are used as private key in encryption segment and as key in generating signature of SHA-1 segment. Generally the random numbers passing the NIST Test suite fails to satisfy cryptographically secure requirements. An approach called twining technique along with AES in counter mode is used to generate cryptographically random numbers from the seed values of sensors. Twining technique is a novel method to minimize co linearity that occurs while extracting seed from multiple sensors housed in same environment. One of the most recent researches in the area of public key cryptography is HyperElliptic Curve Cryptography (HECC) because HECC uses smaller key size and less computational time. In the proposed biometric signcryption, biometric data, HECC and cryptographically secure random numbers are used to derive the signcrypted value of iris.\",\"PeriodicalId\":351133,\"journal\":{\"name\":\"2016 International Conference on Recent Trends in Information Technology (ICRTIT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-04-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Recent Trends in Information Technology (ICRTIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRTIT.2016.7569557\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Recent Trends in Information Technology (ICRTIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRTIT.2016.7569557","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Biometric signcryption using hyperelliptic curve and cryptographically secure random number
The biometric system stores physiological traits of user such as finger print, iris, palm, patterns of veins etc. Iris signcryption is the most successful way to improve the information security because iris consists of most accurate features compared to other authentication systems. In order to provide better security and less computational time lightweight cryptographic scheme called signcryption has introduced. Signcryption is a logical combination of encryption and signature. Cryptographically secure random numbers are used as private key in encryption segment and as key in generating signature of SHA-1 segment. Generally the random numbers passing the NIST Test suite fails to satisfy cryptographically secure requirements. An approach called twining technique along with AES in counter mode is used to generate cryptographically random numbers from the seed values of sensors. Twining technique is a novel method to minimize co linearity that occurs while extracting seed from multiple sensors housed in same environment. One of the most recent researches in the area of public key cryptography is HyperElliptic Curve Cryptography (HECC) because HECC uses smaller key size and less computational time. In the proposed biometric signcryption, biometric data, HECC and cryptographically secure random numbers are used to derive the signcrypted value of iris.