Header

UZH-Logo

Maintenance Infos

Subspace fuzzy vault


Marshall, Kyle; Schipani, Davide; Trautmann, Anna-Lena; Rosenthal, Joachim (2016). Subspace fuzzy vault. In: Baldi, Marco; Tomasin, Stefano. Physical and Data-Link Security Techniques for Future Communication Systems. Cham: Springer Netherlands, 163-172.

Abstract

Fuzzy vault is a scheme providing secure authentication based on fuzzy matching of sets. A major application is the use of biometric features for authentication, whereby unencrypted storage of these features is not an option because of security concerns. While there is still ongoing research around the practical implementation of such schemes, we propose and analyze here an alternative construction based on subspace codes. This offers some advantages in terms of security, as an eventual discovery of the key does not provide an obvious access to the features. Crucial for an efficient implementation are the computational complexity and the choice of good code parameters. The parameters depend on the particular application, e.g. the biometric feature to be stored and the rate one wants to allow for false acceptance. The developed theory is closely linked to constructions of subspace codes studied in the area of random network coding.

Abstract

Fuzzy vault is a scheme providing secure authentication based on fuzzy matching of sets. A major application is the use of biometric features for authentication, whereby unencrypted storage of these features is not an option because of security concerns. While there is still ongoing research around the practical implementation of such schemes, we propose and analyze here an alternative construction based on subspace codes. This offers some advantages in terms of security, as an eventual discovery of the key does not provide an obvious access to the features. Crucial for an efficient implementation are the computational complexity and the choice of good code parameters. The parameters depend on the particular application, e.g. the biometric feature to be stored and the rate one wants to allow for false acceptance. The developed theory is closely linked to constructions of subspace codes studied in the area of random network coding.

Statistics

Citations

Dimensions.ai Metrics
1 citation in Web of Science®
1 citation in Scopus®
3 citations in Microsoft Academic
Google Scholar™

Altmetrics

Additional indexing

Item Type:Book Section, not_refereed, original work
Communities & Collections:07 Faculty of Science > Institute of Mathematics
Dewey Decimal Classification:510 Mathematics
Language:English
Date:2016
Deposited On:07 Dec 2016 08:26
Last Modified:02 Feb 2018 10:10
Publisher:Springer Netherlands
Series Name:Lecture Notes in Electrical Engineering
Number:358
ISSN:1876-1100
ISBN:978-3-319-23608-7
OA Status:Closed
Publisher DOI:https://doi.org/10.1007/978-3-319-23609-4_10
Related URLs:https://www.recherche-portal.ch/ZAD:default_scope:ebi01_prod010600384 (Library Catalogue)

Download

Full text not available from this repository.
View at publisher

Get full-text in a library