A Biometric Key-binding scheme using lattice masking

Yuka Sugimura, Masaya Yasuda, Shigefumi Yamada, Narishige Abe, Takashi Shinzaki

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Template protection technology can protect the confidentiality of a biometric template by certain conversion. We focus on the key-binding approach for template protection. This approach generates a secure template (or a conversion template) from joint data of a user's specific key with a user's template, and the key can be correctly extracted from the secure template only when a queried biometric feature is sufficiently close to the original template. While almost all conventional schemes use the error correcting code (ECC) technique, we present a new technique based on lattices to give a new key-binding scheme. Our proposed scheme can provide several requirements (e.g., diversity and revocability) for template protection, which cannot be provided by ECC-based schemes such as the fuzzy commitment and the fuzzy vault.

Original languageEnglish
Title of host publicationBIOSIG 2014 - Proceedings of the 13th International Conference of the Biometrics Special Interest Group
EditorsArslan Bromme, Christoph Busch
PublisherGesellschaft fur Informatik (GI)
Pages211-218
Number of pages8
ISBN (Electronic)9783885796244
Publication statusPublished - Jan 1 2014
Externally publishedYes
Event13th International Conference of the Biometrics Special Interest Group, BIOSIG 2014 - Darmstadt, Germany
Duration: Sep 10 2014Sep 12 2014

Publication series

NameLecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI)
VolumeP-230
ISSN (Print)1617-5468

Other

Other13th International Conference of the Biometrics Special Interest Group, BIOSIG 2014
CountryGermany
CityDarmstadt
Period9/10/149/12/14

All Science Journal Classification (ASJC) codes

  • Computer Science Applications

Fingerprint Dive into the research topics of 'A Biometric Key-binding scheme using lattice masking'. Together they form a unique fingerprint.

Cite this