Application of Biometric Key in Practical Secret Sharing for DNSsec
نویسندگان
چکیده
Secret sharing is one of the branches of threshold cryptography. Secret sharing is intended to secure a secret key s among a group G with n participants. Thus, the secret key s can be reconstructed by collecting shares of t or more participants. Recently, the secret sharing concept has been applied in securing DNSsec root key. However, the idea of DNSsec root key security is based on Shamir’s (t, n)-secret sharing scheme and has implemented a smart card as a media to store the share information. To improve the system, we have considered Yang et al.’s scheme, one of the earlier practical secret sharing, to apply in DNSsec. By combining these two systems, we propose a biometrics-based practical secret sharing for DNSsec to resolve the problem with the storage media used. Also, we improve the drawbacks of Yang et al.’s scheme by producing a more efficient and asynchronous reconstruction phase compared to other secret sharing. Furthermore, it is applicable to the DNSsec system. Keywords—Practical, Secret Sharing, DNSsec, key protection
منابع مشابه
Computationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملBiometrics Based Secret Sharing Using Fuzzy Vault
In this paper a method for the biometric based secret sharing problem using the fuzzy vault construct is described. The secret is protected using the biometric data of the sharing parties, revealing a secret when a predetermined number of the sharing parties collaborate. The distinction between biometric cryptosystems is discussed. The basic idea of the fuzzy vault scheme is discussed. Finally ...
متن کاملA Review on an Authentication System using Secret Sharing
Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentica...
متن کاملComputation of Cryptographic Keys from Face Biometrics
We outline cryptographic key–computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable for cryptographic applicability. Biohashing is based on iterated inner-products between pseudorandom and userspecific eigenprojections, each of which extracts a single-bit from the face data. This discretisation is highl...
متن کاملRevisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic Schemes
Visual cryptography is an increasingly popular cryptographic technique which allows for secret sharing and encryption of sensitive data. This method has been extended and applied to secure biometric data in various protocols. In this paper, we propose a general framework to help assess the security of these extended biometric visual cryptographic schemes (e-BVC). First, we formalize the notion ...
متن کامل