Cryptographic Key Derivation from Biometric Inferences for Remote Authentication

Author(s):  
Erkam Uzun ◽  
Carter Yagemann ◽  
Simon Chung ◽  
Vladimir Kolesnikov ◽  
Wenke Lee
Author(s):  
Keith M. Martin

This chapter provides an understanding of the fundamental principles behind key management. We consider the typical stages in the lifecycle of a cryptographic key and then review each of these stages in some detail. We discuss the choosing of key lengths and look at different techniques for key generation, including key derivation and generation from components. We then look at different techniques for key establishment, including the use of key hierarchies, key wrapping, and quantum key establishment. We then look at key storage and discuss the role of hardware security modules. We also consider key separation, key change, and key destruction, before closing with a short discussion on governance of key management.


2013 ◽  
Vol 489-490 ◽  
pp. 21-36
Author(s):  
Aldar C.-F. Chan

2018 ◽  
Vol 2018 ◽  
pp. 1-14
Author(s):  
Minhye Seo ◽  
Jong Hwan Park ◽  
Youngsam Kim ◽  
Sangrae Cho ◽  
Dong Hoon Lee ◽  
...  

Biometric data is user-identifiable and therefore methods to use biometrics for authentication have been widely researched. Biometric cryptosystems allow for a user to derive a cryptographic key from noisy biometric data and perform a cryptographic task for authentication or encryption. The fuzzy extractor is known as a prominent biometric cryptosystem. However, the fuzzy extractor has a drawback in that a user is required to store user-specific helper data or receive it online from the server with additional trusted channel, to derive a correct key. In this paper, we present a new biometric-based key derivation function (BB-KDF) to address the issues. In our BB-KDF, users are able to derive cryptographic keys solely from their own biometric data: users do not need any other user-specific helper information. We introduce a security model for the BB-KDF. We then construct the BB-KDF and prove its security in our security model. We then propose an authentication protocol based on the BB-KDF. Finally, we give experimental results to analyze the performance of the BB-KDF. We show that our proposed BB-KDF is computationally efficient and can be deployed on many different kinds of devices.


2019 ◽  
Vol 14 (11) ◽  
pp. 2834-2847 ◽  
Author(s):  
Enrique Argones Rua ◽  
Aysajan Abidin ◽  
Roel Peeters ◽  
Jac Romme

2009 ◽  
Vol 29 (4) ◽  
pp. 950-951
Author(s):  
Xin ZHANG ◽  
Fang-wei LI ◽  
Chun-lan PAN

Symmetry ◽  
2021 ◽  
Vol 13 (5) ◽  
pp. 855
Author(s):  
Tzung-Her Chen ◽  
Wei-Bin Lee ◽  
Hsing-Bai Chen ◽  
Chien-Lung Wang

Although digital signature has been a fundamental technology for cryptosystems, it still draws considerable attention from both academia and industry due to the recent raising interest in blockchains. This article revisits the subliminal channel existing digital signature and reviews its abuse risk of the constructor’s private key. From a different perspective on the subliminal channel, we find the new concept named the chamber of secrets in blockchains. The found concept, whereby the secret is hidden and later recovered by the constructor from the common transactions in a blockchain, highlights a new way to encourage implementing various applications to benefit efficiency and security. Thus, the proposed scheme benefits from the following advantages: (1) avoiding the high maintenance cost of certificate chain of certificate authority, or public key infrastructure, and (2) seamlessly integrating with blockchains using the property of chamber of secrets. In order to easily understand the superiority of this new concept, a remote authentication scenario is taken as a paradigm of IoT to demonstrate that the further advantages are achieved: (1) avoiding high demand for storage space in IoT devices, and (2) avoiding maintaining a sensitive table in IoT server.


2021 ◽  
Author(s):  
Zhengwei Ren ◽  
Xiaojuan Li ◽  
Lina Wang ◽  
Shiwei Xu ◽  
Yan Tong ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document