Full Content is available to subscribers

Subscribe/Learn More  >
Proceedings Article

Secret sharing using biometric traits

[+] Author Affiliations
Alisher Kholmatov, Berrin Yanikoglu, Erkay Savas, Albert Levi

Sabanci Univ. (Turkey)

Proc. SPIE 6202, Biometric Technology for Human Identification III, 62020W (April 17, 2006); doi:10.1117/12.666146
Text Size: A A A
From Conference Volume 6202

  • Biometric Technology for Human Identification III
  • Patrick J. Flynn; Sharath Pankanti
  • Orlando (Kissimmee), FL | April 17, 2006

abstract

In biometric based authentication, biometric traits of a person are matched against his/her stored biometric profile and access is granted if there is sufficient match. However, there are other access scenarios, which require participation of multiple previously registered users for a successful authentication or to get an access grant for a certain entity. For instance, there are cryptographic constructs generally known as secret sharing schemes, where a secret is split into shares and distributed amongst participants in such a way that it is reconstructed/revealed only when the necessary number of share holders come together. The revealed secret can then be used for encryption or authentication (if the revealed key is verified against the previously registered value). In this work we propose a method for the biometric based secret sharing. Instead of splitting a secret amongst participants, as is done in cryptography, a single biometric construct is created using the biometric traits of the participants. During authentication, a valid cryptographic key is released out of the construct when the required number of genuine participants present their biometric traits.

© (2006) COPYRIGHT SPIE--The International Society for Optical Engineering. Downloading of the abstract is permitted for personal use only.
Citation

Alisher Kholmatov ; Berrin Yanikoglu ; Erkay Savas and Albert Levi
"Secret sharing using biometric traits", Proc. SPIE 6202, Biometric Technology for Human Identification III, 62020W (April 17, 2006); doi:10.1117/12.666146; http://dx.doi.org/10.1117/12.666146


Access This Proceeding
Sign in or Create a personal account to Buy this proceeding ($15 for members, $18 for non-members).

Figures

Tables

NOTE:
Citing articles are presented as examples only. In non-demo SCM6 implementation, integration with CrossRef’s "Cited By" API will populate this tab (http://www.crossref.org/citedby.html).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Book Chapters

Topic Collections

Advertisement
  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Proceeding
Sign in or Create a personal account to Buy this proceeding ($15 for members, $18 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.