Header

UZH-Logo

Maintenance Infos

Subspace fuzzy vault


Marshall, Kyle; Schipani, Davide; Trautmann, Anna-Lena; Rosenthal, Joachim (2016). Subspace fuzzy vault. In: Baldi, Marco; Tomasin, Stefano. Physical and Data-Link Security Techniques for Future Communication Systems. Cham: Springer Netherlands, 163-172.

Abstract

Fuzzy vault is a scheme providing secure authentication based on fuzzy matching of sets. A major application is the use of biometric features for authentication, whereby unencrypted storage of these features is not an option because of security concerns. While there is still ongoing research around the practical implementation of such schemes, we propose and analyze here an alternative construction based on subspace codes. This offers some advantages in terms of security, as an eventual discovery of the key does not provide an obvious access to the features. Crucial for an efficient implementation are the computational complexity and the choice of good code parameters. The parameters depend on the particular application, e.g. the biometric feature to be stored and the rate one wants to allow for false acceptance. The developed theory is closely linked to constructions of subspace codes studied in the area of random network coding.

Abstract

Fuzzy vault is a scheme providing secure authentication based on fuzzy matching of sets. A major application is the use of biometric features for authentication, whereby unencrypted storage of these features is not an option because of security concerns. While there is still ongoing research around the practical implementation of such schemes, we propose and analyze here an alternative construction based on subspace codes. This offers some advantages in terms of security, as an eventual discovery of the key does not provide an obvious access to the features. Crucial for an efficient implementation are the computational complexity and the choice of good code parameters. The parameters depend on the particular application, e.g. the biometric feature to be stored and the rate one wants to allow for false acceptance. The developed theory is closely linked to constructions of subspace codes studied in the area of random network coding.

Statistics

Altmetrics

Additional indexing

Item Type:Book Section, not refereed, original work
Communities & Collections:07 Faculty of Science > Institute of Mathematics
Dewey Decimal Classification:510 Mathematics
Language:English
Date:2016
Deposited On:07 Dec 2016 08:26
Last Modified:07 Dec 2016 08:26
Publisher:Springer Netherlands
Series Name:Lecture Notes in Electrical Engineering
Number:358
ISSN:1876-1100
ISBN:978-3-319-23608-7
Publisher DOI:https://doi.org/10.1007/978-3-319-23609-4_10
Related URLs:http://www.recherche-portal.ch/ZAD:default_scope:ebi01_prod010600384 (Library Catalogue)

Download

Full text not available from this repository.
View at publisher

Article Networks

TrendTerms

TrendTerms displays relevant terms of the abstract of this publication and related documents on a map. The terms and their relations were extracted from ZORA using word statistics. Their timelines are taken from ZORA as well. The bubble size of a term is proportional to the number of documents where the term occurs. Red, orange, yellow and green colors are used for terms that occur in the current document; red indicates high interlinkedness of a term with other terms, orange, yellow and green decreasing interlinkedness. Blue is used for terms that have a relation with the terms in this document, but occur in other documents.
You can navigate and zoom the map. Mouse-hovering a term displays its timeline, clicking it yields the associated documents.

Author Collaborations