A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Strategic Information Splitting Using Biometric Patterns
2012
Journal of Internet Services and Information Security
In this paper will be proposed a new algorithm for secure strategic information sharing using biometric information. In classic cryptographic threshold schemes used for secret splitting and sharing there aren't any connection between generated shares and particular participants of threshold protocol. In fact sometimes it may be useful to generate a special personalized shadows, which allow not only reveal the original secret information, but also to identify who is the owner of particular shares or information shadow.
doi:10.22667/jisis.2012.11.31.129
dblp:journals/jisis/OgielaOO12
fatcat:r7vfnlt7hnbsnmk6rbwxk7slue