A collusion attack on the fuzzy vault scheme
Authors
Abstract:
The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on the Fuzzy Vault scheme where the attacker is assumed to have access to multiple vaults locked by the same key and where a non-maximal vault size is used. The attack effectively reduces the vault size by identifying and removing cha_ points. As the vault size decreases, the rate at which cha_ points are identified increases exponentially. Several possible defenses against the attack are also discussed.
similar resources
A Collusion Attack on the Fuzzy Vault Scheme
The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...
full textThe Fuzzy Vault for Fingerprints Is Vulnerable for Brute Force Attack and Collusion Attack
full text
Realization of correlation attack against the fuzzy vault scheme
User privacy and template security are major concerns in the use of biometric systems. These are serious concerns based on the fact that once compromised, biometric traits can not be canceled or reissued. The Fuzzy Vault scheme has emerged as a promising method to alleviate the template security problem. The scheme is based on binding the biometric template with a secret key and scrambling it w...
full textA Fuzzy Vault Scheme
We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault. A player Alice may place a secret value κ in a fuzzy vault and “lock” it using a set A of elements from some public universe U . If Bob tries to “unlock” the vault using a set B of similar length, he obtains κ only if B is close to A, i.e., only if A and B overlap substantially. In constrast to previous...
full textA Fuzzy Vault Scheme for Ordered Biometrics
The fuzzy vault scheme has recently become popular approaches to biometric template protection. Since the original scheme has been designed to work with unordered biometric features, such a scheme cannot effectively utilize order information. We present in this paper a new fuzzy vault scheme that can effectively utilize the ordered characteristics of biometric features. In this scheme, we devel...
full textPalmprint Based Multidimensional Fuzzy Vault Scheme
Fuzzy vault scheme (FVS) is one of the most popular biometric cryptosystems for biometric template protection. However, error correcting code (ECC) proposed in FVS is not appropriate to deal with real-valued biometric intraclass variances. In this paper, we propose a multidimensional fuzzy vault scheme (MDFVS) in which a general subspace error-tolerant mechanism is designed and embedded into FV...
full textMy Resources
Journal title
volume 1 issue 1
pages 27- 34
publication date 2009-01-28
By following a journal you will be notified via email when a new issue of this journal is published.
Keywords
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023