12,821 Hits in 1.8 sec

Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault

Amioy Kumar, Ajay Kumar
2009 EURASIP Journal on Advances in Signal Processing  
Further, Reed and Solomon codes are used on the generated asymmetric key to provide some error tolerance while decryption.  ...  The experimental results from the proposed approach on the palmprint images suggest its possible usage in an automated palmprint-based key generation system.  ...  One of the key objectives of this work is to investigate the usage of palmprint biometric in the development of a cryptographic construct.  ... 
doi:10.1155/2009/967046 fatcat:ynog7nj4jvcipctwhows5yqvqe

Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model (Extended Abstract) [chapter]

Zvi Galil, Stuart Haber, Moti Yung
1988 Lecture Notes in Computer Science  
We model the most general sort of feasible adversarial behavior, and describe fault-recovery procedures that can tolerate it. Our constructions minimize the use of cryptographic resources.  ...  We give a general procedure for designing correct, secure, and fault-tolerant cryptographic protocols for many parties, thus enlarging the domain of tasks that can be performed efficiently by cryptographic  ...  Our god here, both in our work on techniques for cryptographic computation and in our work on fault-tolerance, is to use the complexity-theoretic approach to knowledge in order to design protocols that  ... 
doi:10.1007/3-540-48184-2_10 fatcat:ghzpsdxxjfa5hd2lysht6zonpu

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data [chapter]

Yevgeniy Dodis, Leonid Reyzin, Adam Smith
2004 Lecture Notes in Computer Science  
Thus, R can be used as a key in any cryptographic application.  ...  We propose two primitives: a fuzzy extractor extracts nearly uniform randomness R from its biometric input; the extraction is error-tolerant in the sense that R will be the same even if the input changes  ...  We are also thankful to Madhu Sudan for helpful discussions about the construction of [16] and the uses of error-correcting codes.  ... 
doi:10.1007/978-3-540-24676-3_31 fatcat:qxcx2mtmdfbxnbzzbj7inwce3e

Multiparty Unconditionally Secure Protocols (Abstract) [chapter]

David Chaum, Claude Crépeau, Ivan Damgård
1988 Lecture Notes in Computer Science  
All the constructions suggested so far rely on trapdoor one-way functions, and therefore must assume essentially that public key cryptography is possible.  ...  Moreover, the constructions have a built-in fault tolerance: once the participants have sent messages committing themselves to the secrets they will use in the protocol, there is no way less than a third  ...  All the constructions suggested so far rely on trapdoor one-way functions, and therefore must assume essentially that public key cryptography is possible.  ... 
doi:10.1007/3-540-48184-2_43 fatcat:eykre6na5fbirpwanlyqeb2ea4

FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices

Mo Zhang, Eduard Marin, David Oswald, Dave Singelee
2021 Zenodo  
At the core of such protocols are fuzzy cryptographic primitives that allow to agree on a shared secret based on several simultaneous, noisy measurements of the same signal.  ...  In this paper, we study the feasibility of six types of fuzzy cryptographic primitives on embedded devices for 128-bit key agreement.  ...  Therefore, we selected several RS constructions with error tolerance within 2% + the pre-defined mismatch rate thresholds. For example, the error tolerance of a (31, 29, 1) RS code is 3.23%.  ... 
doi:10.5281/zenodo.5711180 fatcat:p3u35hx3qncuthsdfcldsomah4

A palmprint-based cryptosystem using double encryption

Amioy Kumar, Ajay Kumar, B.V.K. Vijaya Kumar, Salil Prabhakar, Arun A. Ross
2008 Biometric Technology for Human Identification V  
Reed and Solomon codes are then used on the generated asymmetric key to provide some error tolerance while decryption.  ...  The experimental results from the proposed approach on the real palmprint images suggest its possible usage in an automated palmprint based key generation system.  ...  The optimal range for tolerance value is dependent on the range of palmprint features. The main consideration is on the construction of palmprint based fuzzy vault around private key.  ... 
doi:10.1117/12.778833 fatcat:cpcbdgraq5gpzmmgrbbb653dva

Folklore, practice and theory of robust combiners

Amir Herzberg
2009 Journal of Computer Security  
Cryptographic schemes are often designed as a combination of multiple component cryptographic modules.  ...  We also analyze few other basic, folklore tolerant combiners, including the parallel combiner for one-way functions, and the copy combiner for integrity tasks such as Message Authentication Codes (MAC)  ...  In fact, ignoring efficiency, we can ensure tolerance for many tasks, by using provable combiners of cryptographic mechanisms from few 'basic' cryptographic mechanisms such as one-way function, which have  ... 
doi:10.3233/jcs-2009-0336 fatcat:axbzeyzwcrax7ojlyy7nl2u2oe

Multi-valued Byzantine Broadcast: The t < n Case [chapter]

Martin Hirt, Pavel Raykov
2014 Lecture Notes in Computer Science  
The security of the protocol is based on the security of the construction and the security of the broadcast for short messages.  ...  The construction by Turpin and Coan [TC84] is perfectly secure and tolerates t < n/3 while communicating O( n 2 + nB(1)) bits.  ...  A On the Constructions of Liang and Vaidya [LV11, LV10a, LV10b] In [LV11] it is stated that the broadcast constructions presented there can be extended to tolerate t ≥ n/3.  ... 
doi:10.1007/978-3-662-45608-8_24 fatcat:54x33ihpo5dank62piq7rr5fdq

Biometric Key Capsulation Technique Based on Fingerprint Vault: Anatomy and attack

M.S. AlTarawneh, W.L. Woo, S.S. Dlay
2008 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications  
Keys entropy depends on level of shielding, secret key depend on degree of polynomial, while encryption key depend on constructed vault entropy, and it is slightly more efficient in terms of encryption  ...  All cryptographic algorithms have a proven security but they suffer from the key management problems: hiding a key and unlocking it with biometric or other approximately matching data.  ...  This cryptographic construct is subject of our proposed technique as a core of capsulation construct. II.  ... 
doi:10.1109/ictta.2008.4530122 fatcat:xxcdqx7rcbaolemqtd6ufuv6ja

A New Palm Print Based Fuzzy Vault System for Securing Cryptographic Key

Om Prakash
2012 International Journal of Information and Electronics Engineering  
This paper therefore uses the polynomial construction on the secret key using appropriate mapping function and taking the projection of palm print feature on the polynomial constructed which together makes  ...  We present the usage of biometrics technique in asymmetric cryptographic domain where we protect secret key involved in cryptographic with the help of fuzzy vault created by randomizing the palm print  ...  PROPOSED FUZZY VAULT SYSTEM Fuzzy vault scheme is a simple and novel cryptographic construction.  ... 
doi:10.7763/ijiee.2012.v2.100 fatcat:fte4i5lnevbflfagaw7pluwasy

Fuzzy Vault for Face Based Cryptographic Key Generation

Yongjin Wang, K.N. Plataniotis
2007 2007 Biometrics Symposium  
A windowing process is applied to tolerate the variations of biometrics signals.  ...  This paper presents a method for changeable cryptographic key generation using face biometrics signal.  ...  Traditional cryptographic systems verify the authenticity of an individual based on the possession of a cryptographic key.  ... 
doi:10.1109/bcc.2007.4430549 fatcat:b374o2onnzb6bipkm4s7qbizxe

Psst, Can You Keep a Secret?

Apostol Vassilev, Nicky Mouha, Luis Brandao
2018 Computer  
The security of encrypted data depends not only on the theoretical properties of cryptographic primitives but also on the robustness of their implementations in software and hardware.  ...  Now let's construct a threshold scheme for digital signatures.  ...  They are related to the fields of secure multiparty computation, intrusion-tolerant protocols, and fault-tolerant and side-channel-resistant implementations.  ... 
doi:10.1109/mc.2018.1151029 pmid:29576634 pmcid:PMC5865220 fatcat:zspmxa2zfrcllaypgre3plz6fy

Cryptographic Key Generation based on Contextual Information: A Review

Aparna A., Ajish S.
2016 International Journal of Computer Applications  
The present state of ensuring secure communication between devices largely relies on the use of cryptographic keys.  ...  This paper presents a detailed survey on the cryptographic techniques for key generation based on contextual information. A brief comparison on the current techniques is also presented in this survey.  ...  Light Medium A comparison analysis based on error tolerance rate is shown in the following chart.  ... 
doi:10.5120/ijca2016908123 fatcat:gvdh2kdzvzcltipzenabr3qqsy

Secured Fingerprint based Crypto System with Reversible Watermarking Scheme

Lakshmi Saranya. R
2017 International Journal for Research in Applied Science and Engineering Technology  
Cryptographic key plays an important entity to overcome channel attacks. High security is difficult in randomly generated cryptographic keys.  ...  Biometric based cryptographic key generation has some difficulties to maintain privacy of biometrics and key generation at receiver in present error data.  ...  composite features which are reliable, distortion tolerant and registration free.  ... 
doi:10.22214/ijraset.2017.4096 fatcat:3ceulp7kvrg7bin4er3d5mla6e

Implementing Trustworthy Services Using Replicated State Machines

F.B. Schneider, Lidong Zhou
2005 IEEE Security and Privacy  
For some years, we have been investigating how to construct systems that continue functioning despite component failures and attacks.  ...  enough state-machine copies so that outputs from the ones exhibiting Byzantine behavior are outvoted by the correctly functioning ones.  ...  Acknowledgments Helpful comments on earlier drafts of this article were provided by Mar-  ... 
doi:10.1109/msp.2005.125 fatcat:e3mnqp4aqrbrxloyxfhi4nz4ci
« Previous Showing results 1 — 15 out of 12,821 results