The fuzzy vault
The fuzzy vault scheme [10] obtains its advantages through thinking of a codeword as
an evaluation of a polynomial over a set of points. The intuition can be introduced by the
following motivational example.
Presume two parties, a prover A and a verifier B. The
prover A wants to find someone who shares her taste in movies without revealing her
preferences. For this purpose she compiles a set k of her favorite movies and encodes
her secret telephone number as a polynomial. The set k is treated as a witness to lock the
committed secret telephone number, yielding a fuzzy vault. The fuzzy
vault is published and allows another party, the verifier B, to compare his movie set
with the one concealed in the vault. In case A and B have similar but not identical taste
of movies, the verifier B will succeed in unlocking the vault and obtain the telephone
number of A. On the other hand, anyone who tries to unlock with a set of movies
differing substantially from the favorites of A, will fail. The vault construction thus
ensures restricted access to the movie set and telephone number.
The possibility that the witnesses are sets that may be arbitrarily ordered, i.e. true
sets rather than sequences, distinguishes Juels and Sudan’s scheme from prior work.
Their framework is applicable in circumstances where order cannot be imposed to input
data and exactitude represents a drawback. This capability assigns the fuzzy vault the
crucial distinction to constitute a biometric cryptosystem. The fuzzy vault scheme of
Juels and Sudan provides a framework to lock a secret value using an unordered witness
set of locking elements, such that someone who possesses a substantial amount of the
locking elements will be capable of unlocking the secret. The security concept is based
on the difficulty of the polynomial reconstruction problem.
The multiple control fuzzy vault
Current biometric cryptosystems rely on Juels and Sudan’s fuzzy vault concept which
restricts its employment to only one applicant or one biometric trait. Extending the
“single control” fuzzy vault to a “multiple control” tool not only generalizes the construction
but also allows the addition of structured secret access control into the original
fuzzy vault.
In particular threshold, compartmented and hierarchical access structures
contribute significant new application opportunities. Those include scenarios applying
multimodal biometric applications or shared biometric access control without requiring
storage of unprotected biometric datasets. Systems based on our constructions offer
flexibility to choose amongst different biometric traits according to the environment.
The proposed construction of a
multiple control scheme can be
implemented with all biometric traits. The employed multiple control structure has been inspired by Shamir’s
secret sharing scheme and the fuzzy vault. Within the paper the locking and unlocking of a multiple control
fuzzy vault differentiating amongst three access structures for secret reveal and concealment will be exampled.
The security and legitimate complexity will be delved into allowing a better
insight of achievements, constraints and improvements in comparison to the single control
framework. The presentation of the multiple control fuzzy vault has been kept on a
general basis to allow ease of adoption using a variety of biometrics employed for the
locking and unlocking.
For more information on the biometric cryptosystem and its implementation you can get in touch with us.
More about the publication "A mupltiple-control fuzzy vault"