A key agreement scheme for smart cards using biometrics

Bhaskar Mondal, Anirban Bhowmick, Tanupriya Choudhury, Tarni Mandal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Locking the cryptographic key is as imperative as the security of the confidential data. A secure key agreement protocol ensures a secure session between two or more parties. Once a key has been shared, the users can communicate resourcefully. The authors look to certify secure key sharing making use of a transmitter engendered vth order polynomial and the users personal biometrics like fingerprints. Genuine points are generated, using the key and the biometrics, which lie on the polynomial. Chaff points are added in order to upsurge confusion and augment security. These points united with the Message Authentication Code (MAC) of the key and timestamp form the fuzzy vault which is communicated to the other end. The receiver needs to select the genuine points using the biometric features to retrieve the cryptographic key.

Original languageEnglish
Title of host publicationProceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1011-1015
Number of pages5
ISBN (Electronic)9781509016662
DOIs
Publication statusPublished - 10-01-2017
Externally publishedYes
Event2016 IEEE International Conference on Computing, Communication and Automation, ICCCA 2016 - Greater Noida, India
Duration: 29-04-201630-04-2016

Conference

Conference2016 IEEE International Conference on Computing, Communication and Automation, ICCCA 2016
Country/TerritoryIndia
CityGreater Noida
Period29-04-1630-04-16

All Science Journal Classification (ASJC) codes

  • Computational Mathematics
  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'A key agreement scheme for smart cards using biometrics'. Together they form a unique fingerprint.

Cite this