The vulnerabilities analysis of fuzzy vault using password

Sumin Hong, Woongryul Jeon, Seungjoo Kim, Dongho Won, Choonsik Park

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Abstract

Fingerprint is immutable and unchangeable. Thus, if it is disclosed, owner of fingerprint cannot use his fingerprint any longer. Fuzzy vault is a cryptographic framework that makes secure template storage to bind the template with a uniformly random key. In order to keep fuzzy vault secure, various schemes are studied using special data like password. K. Nandakumar proposed a scheme for hardening a fingerprint minutiae-based fuzzy vault using password. However, that scheme has vulnerabilities against several attacks. In this paper, we analyze vulnerabilities of K. Nandakumar 's scheme and propose a new scheme which is secure against various attacks to fuzzy vaults.

Original languageEnglish
Title of host publicationProceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008 and BSBT 2008
Subtitle of host publication2008 International Conference on Bio-Science and Bio-Technology
Pages76-83
Number of pages8
DOIs
Publication statusPublished - 2008
Event2008 International Conference on Bio-Science and Bio-Technology, BSBT 2008, held in conjunction with 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008 - Hainan Island, China
Duration: 2008 Dec 132008 Dec 15

Publication series

NameProceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008 and BSBT 2008: 2008 International Conference on Bio-Science and Bio-Technology
Volume3

Other

Other2008 International Conference on Bio-Science and Bio-Technology, BSBT 2008, held in conjunction with 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008
CountryChina
CityHainan Island
Period08/12/1308/12/15

ASJC Scopus subject areas

  • Biotechnology
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'The vulnerabilities analysis of fuzzy vault using password'. Together they form a unique fingerprint.

  • Cite this

    Hong, S., Jeon, W., Kim, S., Won, D., & Park, C. (2008). The vulnerabilities analysis of fuzzy vault using password. In Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008 and BSBT 2008: 2008 International Conference on Bio-Science and Bio-Technology (pp. 76-83). [4734284] (Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008 and BSBT 2008: 2008 International Conference on Bio-Science and Bio-Technology; Vol. 3). https://doi.org/10.1109/FGCN.2008.211