Title :
Mathematical formulation for the secure and versatile integration of biometric data into a cryptographic framework
Author :
Goh, Alwyn ; Ngo, David C L
Author_Institution :
Corentix Lab., Petaling Jaya, Malaysia
Abstract :
This paper presents the mathematical formulation for the secure and versatile integration of biometric data into a cryptographic framework. The use of Shamir polynomial thresholding to further stabilise bitstrings derived from token-and (*)-biometric inputs, resulting in zero-uncertainty cryptographic keystrings is described. This enables direct biometric applicability in cryptographic protocols. Bio-hash implementations operate in a priori insecure environments or message-based scenarios. The versatility of discretisation based on a generic inner-product formulation raises the possibility of using Shamir interpolation to integrate multiple biometric forms ie face and fingerprint,which is combined with discrete token and/or knowledge key-factors. Therefore, token*biometric cryptographic factorizations are rigorously secure and flexible versatile.
Keywords :
face recognition; fingerprint identification; interpolation; polynomials; public key cryptography; Shamir interpolation; Shamir polynomial threshold; bio-hash implementation; biometric data integration; bitstring stability; cryptographic framework; cryptographic protocol; face-fingerprint form; generic inner-product formulation; knowledge key-factor; mathematical formulation; secure versatility; token discretisation versatility; token*biometric cryptographic factorization; zero-uncertainty cryptographic keystring; Bioinformatics; Biometrics; Cryptographic protocols; Elliptic curve cryptography; Information security; Interpolation; Iris; Laboratories; Polynomials; Robustness;
Conference_Titel :
Information and Communication Technologies: From Theory to Applications, 2004. Proceedings. 2004 International Conference on
Print_ISBN :
0-7803-8482-2
DOI :
10.1109/ICTTA.2004.1307806