Fingerprint-based key binding/recovering scheme based on fuzzy vault
Abstract This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of t...
Ausführliche Beschreibung
Autor*in: |
Feng, Quan [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2008 |
---|
Anmerkung: |
© Science Press 2008 |
---|
Übergeordnetes Werk: |
Enthalten in: Journal of electronics (China) - Beijing : Science Pr., 1984, 25(2008), 3 vom: Mai, Seite 415-421 |
---|---|
Übergeordnetes Werk: |
volume:25 ; year:2008 ; number:3 ; month:05 ; pages:415-421 |
Links: |
---|
DOI / URN: |
10.1007/s11767-007-0152-7 |
---|
Katalog-ID: |
SPR022302476 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | SPR022302476 | ||
003 | DE-627 | ||
005 | 20230330073709.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201006s2008 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1007/s11767-007-0152-7 |2 doi | |
035 | |a (DE-627)SPR022302476 | ||
035 | |a (SPR)s11767-007-0152-7-e | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
100 | 1 | |a Feng, Quan |e verfasserin |4 aut | |
245 | 1 | 0 | |a Fingerprint-based key binding/recovering scheme based on fuzzy vault |
264 | 1 | |c 2008 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a © Science Press 2008 | ||
520 | |a Abstract This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key derived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key. | ||
700 | 1 | |a Su, Fei |4 aut | |
700 | 1 | |a Cai, Anni |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Journal of electronics (China) |d Beijing : Science Pr., 1984 |g 25(2008), 3 vom: Mai, Seite 415-421 |w (DE-627)537443169 |w (DE-600)2376287-1 |x 1993-0615 |7 nnns |
773 | 1 | 8 | |g volume:25 |g year:2008 |g number:3 |g month:05 |g pages:415-421 |
856 | 4 | 0 | |u https://dx.doi.org/10.1007/s11767-007-0152-7 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_SPRINGER | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_74 | ||
912 | |a GBV_ILN_90 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_120 | ||
912 | |a GBV_ILN_150 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_374 | ||
912 | |a GBV_ILN_702 | ||
912 | |a GBV_ILN_2190 | ||
912 | |a GBV_ILN_2700 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4328 | ||
951 | |a AR | ||
952 | |d 25 |j 2008 |e 3 |c 05 |h 415-421 |
author_variant |
q f qf f s fs a c ac |
---|---|
matchkey_str |
article:19930615:2008----::igrrnbsdebnigeoeigcee |
hierarchy_sort_str |
2008 |
publishDate |
2008 |
allfields |
10.1007/s11767-007-0152-7 doi (DE-627)SPR022302476 (SPR)s11767-007-0152-7-e DE-627 ger DE-627 rakwb eng Feng, Quan verfasserin aut Fingerprint-based key binding/recovering scheme based on fuzzy vault 2008 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © Science Press 2008 Abstract This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key derived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key. Su, Fei aut Cai, Anni aut Enthalten in Journal of electronics (China) Beijing : Science Pr., 1984 25(2008), 3 vom: Mai, Seite 415-421 (DE-627)537443169 (DE-600)2376287-1 1993-0615 nnns volume:25 year:2008 number:3 month:05 pages:415-421 https://dx.doi.org/10.1007/s11767-007-0152-7 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_20 GBV_ILN_31 GBV_ILN_40 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_110 GBV_ILN_120 GBV_ILN_150 GBV_ILN_161 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_702 GBV_ILN_2190 GBV_ILN_2700 GBV_ILN_4313 GBV_ILN_4328 AR 25 2008 3 05 415-421 |
spelling |
10.1007/s11767-007-0152-7 doi (DE-627)SPR022302476 (SPR)s11767-007-0152-7-e DE-627 ger DE-627 rakwb eng Feng, Quan verfasserin aut Fingerprint-based key binding/recovering scheme based on fuzzy vault 2008 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © Science Press 2008 Abstract This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key derived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key. Su, Fei aut Cai, Anni aut Enthalten in Journal of electronics (China) Beijing : Science Pr., 1984 25(2008), 3 vom: Mai, Seite 415-421 (DE-627)537443169 (DE-600)2376287-1 1993-0615 nnns volume:25 year:2008 number:3 month:05 pages:415-421 https://dx.doi.org/10.1007/s11767-007-0152-7 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_20 GBV_ILN_31 GBV_ILN_40 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_110 GBV_ILN_120 GBV_ILN_150 GBV_ILN_161 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_702 GBV_ILN_2190 GBV_ILN_2700 GBV_ILN_4313 GBV_ILN_4328 AR 25 2008 3 05 415-421 |
allfields_unstemmed |
10.1007/s11767-007-0152-7 doi (DE-627)SPR022302476 (SPR)s11767-007-0152-7-e DE-627 ger DE-627 rakwb eng Feng, Quan verfasserin aut Fingerprint-based key binding/recovering scheme based on fuzzy vault 2008 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © Science Press 2008 Abstract This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key derived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key. Su, Fei aut Cai, Anni aut Enthalten in Journal of electronics (China) Beijing : Science Pr., 1984 25(2008), 3 vom: Mai, Seite 415-421 (DE-627)537443169 (DE-600)2376287-1 1993-0615 nnns volume:25 year:2008 number:3 month:05 pages:415-421 https://dx.doi.org/10.1007/s11767-007-0152-7 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_20 GBV_ILN_31 GBV_ILN_40 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_110 GBV_ILN_120 GBV_ILN_150 GBV_ILN_161 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_702 GBV_ILN_2190 GBV_ILN_2700 GBV_ILN_4313 GBV_ILN_4328 AR 25 2008 3 05 415-421 |
allfieldsGer |
10.1007/s11767-007-0152-7 doi (DE-627)SPR022302476 (SPR)s11767-007-0152-7-e DE-627 ger DE-627 rakwb eng Feng, Quan verfasserin aut Fingerprint-based key binding/recovering scheme based on fuzzy vault 2008 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © Science Press 2008 Abstract This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key derived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key. Su, Fei aut Cai, Anni aut Enthalten in Journal of electronics (China) Beijing : Science Pr., 1984 25(2008), 3 vom: Mai, Seite 415-421 (DE-627)537443169 (DE-600)2376287-1 1993-0615 nnns volume:25 year:2008 number:3 month:05 pages:415-421 https://dx.doi.org/10.1007/s11767-007-0152-7 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_20 GBV_ILN_31 GBV_ILN_40 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_110 GBV_ILN_120 GBV_ILN_150 GBV_ILN_161 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_702 GBV_ILN_2190 GBV_ILN_2700 GBV_ILN_4313 GBV_ILN_4328 AR 25 2008 3 05 415-421 |
allfieldsSound |
10.1007/s11767-007-0152-7 doi (DE-627)SPR022302476 (SPR)s11767-007-0152-7-e DE-627 ger DE-627 rakwb eng Feng, Quan verfasserin aut Fingerprint-based key binding/recovering scheme based on fuzzy vault 2008 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © Science Press 2008 Abstract This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key derived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key. Su, Fei aut Cai, Anni aut Enthalten in Journal of electronics (China) Beijing : Science Pr., 1984 25(2008), 3 vom: Mai, Seite 415-421 (DE-627)537443169 (DE-600)2376287-1 1993-0615 nnns volume:25 year:2008 number:3 month:05 pages:415-421 https://dx.doi.org/10.1007/s11767-007-0152-7 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_20 GBV_ILN_31 GBV_ILN_40 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_110 GBV_ILN_120 GBV_ILN_150 GBV_ILN_161 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_702 GBV_ILN_2190 GBV_ILN_2700 GBV_ILN_4313 GBV_ILN_4328 AR 25 2008 3 05 415-421 |
language |
English |
source |
Enthalten in Journal of electronics (China) 25(2008), 3 vom: Mai, Seite 415-421 volume:25 year:2008 number:3 month:05 pages:415-421 |
sourceStr |
Enthalten in Journal of electronics (China) 25(2008), 3 vom: Mai, Seite 415-421 volume:25 year:2008 number:3 month:05 pages:415-421 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
isfreeaccess_bool |
false |
container_title |
Journal of electronics (China) |
authorswithroles_txt_mv |
Feng, Quan @@aut@@ Su, Fei @@aut@@ Cai, Anni @@aut@@ |
publishDateDaySort_date |
2008-05-01T00:00:00Z |
hierarchy_top_id |
537443169 |
id |
SPR022302476 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR022302476</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230330073709.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201006s2008 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11767-007-0152-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR022302476</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s11767-007-0152-7-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Feng, Quan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fingerprint-based key binding/recovering scheme based on fuzzy vault</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2008</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Science Press 2008</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key derived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Su, Fei</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cai, Anni</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Journal of electronics (China)</subfield><subfield code="d">Beijing : Science Pr., 1984</subfield><subfield code="g">25(2008), 3 vom: Mai, Seite 415-421</subfield><subfield code="w">(DE-627)537443169</subfield><subfield code="w">(DE-600)2376287-1</subfield><subfield code="x">1993-0615</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:25</subfield><subfield code="g">year:2008</subfield><subfield code="g">number:3</subfield><subfield code="g">month:05</subfield><subfield code="g">pages:415-421</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s11767-007-0152-7</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_120</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_374</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2700</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4328</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">25</subfield><subfield code="j">2008</subfield><subfield code="e">3</subfield><subfield code="c">05</subfield><subfield code="h">415-421</subfield></datafield></record></collection>
|
author |
Feng, Quan |
spellingShingle |
Feng, Quan Fingerprint-based key binding/recovering scheme based on fuzzy vault |
authorStr |
Feng, Quan |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)537443169 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
springer |
remote_str |
true |
illustrated |
Not Illustrated |
issn |
1993-0615 |
topic_title |
Fingerprint-based key binding/recovering scheme based on fuzzy vault |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Journal of electronics (China) |
hierarchy_parent_id |
537443169 |
hierarchy_top_title |
Journal of electronics (China) |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)537443169 (DE-600)2376287-1 |
title |
Fingerprint-based key binding/recovering scheme based on fuzzy vault |
ctrlnum |
(DE-627)SPR022302476 (SPR)s11767-007-0152-7-e |
title_full |
Fingerprint-based key binding/recovering scheme based on fuzzy vault |
author_sort |
Feng, Quan |
journal |
Journal of electronics (China) |
journalStr |
Journal of electronics (China) |
lang_code |
eng |
isOA_bool |
false |
recordtype |
marc |
publishDateSort |
2008 |
contenttype_str_mv |
txt |
container_start_page |
415 |
author_browse |
Feng, Quan Su, Fei Cai, Anni |
container_volume |
25 |
format_se |
Elektronische Aufsätze |
author-letter |
Feng, Quan |
doi_str_mv |
10.1007/s11767-007-0152-7 |
title_sort |
fingerprint-based key binding/recovering scheme based on fuzzy vault |
title_auth |
Fingerprint-based key binding/recovering scheme based on fuzzy vault |
abstract |
Abstract This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key derived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key. © Science Press 2008 |
abstractGer |
Abstract This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key derived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key. © Science Press 2008 |
abstract_unstemmed |
Abstract This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key derived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key. © Science Press 2008 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_20 GBV_ILN_31 GBV_ILN_40 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_110 GBV_ILN_120 GBV_ILN_150 GBV_ILN_161 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_374 GBV_ILN_702 GBV_ILN_2190 GBV_ILN_2700 GBV_ILN_4313 GBV_ILN_4328 |
container_issue |
3 |
title_short |
Fingerprint-based key binding/recovering scheme based on fuzzy vault |
url |
https://dx.doi.org/10.1007/s11767-007-0152-7 |
remote_bool |
true |
author2 |
Su, Fei Cai, Anni |
author2Str |
Su, Fei Cai, Anni |
ppnlink |
537443169 |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s11767-007-0152-7 |
up_date |
2024-07-04T02:36:43.133Z |
_version_ |
1803614266993934336 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR022302476</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230330073709.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201006s2008 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11767-007-0152-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR022302476</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s11767-007-0152-7-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Feng, Quan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fingerprint-based key binding/recovering scheme based on fuzzy vault</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2008</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Science Press 2008</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key derived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Su, Fei</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cai, Anni</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Journal of electronics (China)</subfield><subfield code="d">Beijing : Science Pr., 1984</subfield><subfield code="g">25(2008), 3 vom: Mai, Seite 415-421</subfield><subfield code="w">(DE-627)537443169</subfield><subfield code="w">(DE-600)2376287-1</subfield><subfield code="x">1993-0615</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:25</subfield><subfield code="g">year:2008</subfield><subfield code="g">number:3</subfield><subfield code="g">month:05</subfield><subfield code="g">pages:415-421</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s11767-007-0152-7</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_120</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_374</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2700</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4328</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">25</subfield><subfield code="j">2008</subfield><subfield code="e">3</subfield><subfield code="c">05</subfield><subfield code="h">415-421</subfield></datafield></record></collection>
|
score |
7.4005775 |