Paper
28 October 2022 A fuzzy vault scheme with multi-secret sharing
Zichao Song, Dong Chen, Jiawei He, Wenyong Yuan, Pei Chen
Author Affiliations +
Proceedings Volume 12453, Third International Conference on Computer Communication and Network Security (CCNS 2022); 124531G (2022) https://doi.org/10.1117/12.2659114
Event: Third International Conference on Computer Communication and Network Security (CCNS 2022), 2022, Hohhot, China
Abstract
The fuzzy vault algorithm is mainly used for data privacy protection in fault-tolerant environments, It binds biometric features and secret data together safely to form a vault, which can realize "fuzzy" unlocking. in the real-life, fuzzy vault is mainly used in biometric authentication, image capture, recognition, etc. However, At present, most fuzzy vault schemes have the problems of high computational complexity and low communication efficiency. To solve the problems of high computational complexity and low communication efficiency in identity authentication, we based on the fuzzy vault scheme and construct a multi-secret sharing fuzzy vault scheme. which splits the big secret value into multiple sub-secret values and uses the RS code multi-secret sharing decoding method to improve the efficiency of biological identity authentication. Firstly, splits the big secret value into multiple sub-secret values. Then, We construct a multi-secret sharing scheme. our scheme supports the sharing of multi-secret information. Finally, we analyze the computational complexity and communication complexity of the scheme. The analysis shows that our scheme can reduce the computational complexity and communication complexity by an order of magnitude.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zichao Song, Dong Chen, Jiawei He, Wenyong Yuan, and Pei Chen "A fuzzy vault scheme with multi-secret sharing", Proc. SPIE 12453, Third International Conference on Computer Communication and Network Security (CCNS 2022), 124531G (28 October 2022); https://doi.org/10.1117/12.2659114
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Fuzzy logic

Information security

Remote sensing

Biometrics

Biological research

Data fusion

Forward error correction

RELATED CONTENT

On information leakage in fuzzy commitment
Proceedings of SPIE (January 27 2010)
A palmprint-based cryptosystem using double encryption
Proceedings of SPIE (March 17 2008)
On the security of biohashing
Proceedings of SPIE (January 27 2010)
Generation an ideal DEM by fusion shape from shading and...
Proceedings of SPIE (February 13 2004)

Back to Top