Paper Abstract and Keywords |
Presentation |
2013-07-19 13:20
A proposal of key binding technology using lattice masking Yuka Sugimura, Masaya Yasuda, Shigefumi Yamada, Narishige Abe, Takashi Shinzaki (Fujitsu Lab.) ISEC2013-42 SITE2013-37 ICSS2013-47 EMM2013-44 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Recently, the biometric template protection technology has been actively researched in biometrics.
In this technology, the enrollment biometric data called a template are protected by some conversion.
Among many approaches for the template protection technology, we here focus on the key binding approach. In the key binding approach, helper data is generated from joint data of a user's specific key with user's biometric data, and the user's specific key can be extracted only when the enrolled biometric data and a query data are sufficiently similar.
By handling digital signature or document information as a user's specific key, the key binding approach can be applied to the digital signature, and document encryption/decryption.
Hence the key binding approach is expected to be applied not only to authentication but also to various application scenarios. While conventional schemes like fuzzy commitment and fuzzy vault schemes use the error correcting code technique to achieve the key binding approach, we present a new scheme using so called the lattice masking.
The notion of the lattice masking is derived from a combination of the random masking technique and the lattice theory.
In this paper, we describe the feature of our scheme and also introduce a concrete application example. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
biometrics / lattice masking / template protection / biometric cryptosystem / key binding / / / |
Reference Info. |
IEICE Tech. Rep., vol. 113, no. 135, ISEC2013-42, pp. 297-304, July 2013. |
Paper # |
ISEC2013-42 |
Date of Issue |
2013-07-11 (ISEC, SITE, ICSS, EMM) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
ISEC2013-42 SITE2013-37 ICSS2013-47 EMM2013-44 |
Conference Information |
Committee |
EMM ISEC SITE ICSS IPSJ-CSEC IPSJ-SPT |
Conference Date |
2013-07-18 - 2013-07-19 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
|
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Security |
Paper Information |
Registration To |
ISEC |
Conference Code |
2013-07-EMM-ISEC-SITE-ICSS-CSEC-SPT |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
A proposal of key binding technology using lattice masking |
Sub Title (in English) |
|
Keyword(1) |
biometrics |
Keyword(2) |
lattice masking |
Keyword(3) |
template protection |
Keyword(4) |
biometric cryptosystem |
Keyword(5) |
key binding |
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Yuka Sugimura |
1st Author's Affiliation |
Fujitsu Laboratories Ltd. (Fujitsu Lab.) |
2nd Author's Name |
Masaya Yasuda |
2nd Author's Affiliation |
Fujitsu Laboratories Ltd. (Fujitsu Lab.) |
3rd Author's Name |
Shigefumi Yamada |
3rd Author's Affiliation |
Fujitsu Laboratories Ltd. (Fujitsu Lab.) |
4th Author's Name |
Narishige Abe |
4th Author's Affiliation |
Fujitsu Laboratories Ltd. (Fujitsu Lab.) |
5th Author's Name |
Takashi Shinzaki |
5th Author's Affiliation |
Fujitsu Laboratories Ltd. (Fujitsu Lab.) |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2013-07-19 13:20:00 |
Presentation Time |
25 minutes |
Registration for |
ISEC |
Paper # |
ISEC2013-42, SITE2013-37, ICSS2013-47, EMM2013-44 |
Volume (vol) |
vol.113 |
Number (no) |
no.135(ISEC), no.136(SITE), no.137(ICSS), no.138(EMM) |
Page |
pp.297-304 |
#Pages |
8 |
Date of Issue |
2013-07-11 (ISEC, SITE, ICSS, EMM) |
|