Abstract
Locking the cryptographic key is as imperative as the security of the confidential data. A secure key agreement protocol ensures a secure session between two or more parties. Once a key has been shared, the users can communicate resourcefully. The authors look to certify secure key sharing making use of a transmitter engendered vth order polynomial and the users personal biometrics like fingerprints. Genuine points are generated, using the key and the biometrics, which lie on the polynomial. Chaff points are added in order to upsurge confusion and augment security. These points united with the Message Authentication Code (MAC) of the key and timestamp form the fuzzy vault which is communicated to the other end. The receiver needs to select the genuine points using the biometric features to retrieve the cryptographic key.
Original language | English |
---|---|
Title of host publication | Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 1011-1015 |
Number of pages | 5 |
ISBN (Electronic) | 9781509016662 |
DOIs | |
Publication status | Published - 10-01-2017 |
Externally published | Yes |
Event | 2016 IEEE International Conference on Computing, Communication and Automation, ICCCA 2016 - Greater Noida, India Duration: 29-04-2016 → 30-04-2016 |
Conference
Conference | 2016 IEEE International Conference on Computing, Communication and Automation, ICCCA 2016 |
---|---|
Country/Territory | India |
City | Greater Noida |
Period | 29-04-16 → 30-04-16 |
All Science Journal Classification (ASJC) codes
- Computational Mathematics
- Computer Networks and Communications
- Computer Science Applications
- Hardware and Architecture