Skip to main content
Kent Academic Repository

Reliable and Secure Encryption Key Generation from Fingerprints

Sheng, Weiguo, Howells, Gareth, Fairhurst, Michael, Deravi, Farzin, Chen, Shengyong (2012) Reliable and Secure Encryption Key Generation from Fingerprints. Information Management & Computer Security, 20 (3). pp. 207-221. ISSN 0968-5227. (doi:10.1108/09685221211247307) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:35565)

The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided.
Official URL:
http://dx.doi.org/10.1108/09685221211247307

Abstract

Purpose ? Biometric authentication, which requires storage of biometric templates and/or encryption keys, raises a matter of serious concern, since the compromise of templates or keys necessarily compromises the information secured by those keys. To address such concerns, efforts based on dynamic key generation directly from the biometrics have recently emerged. However, previous methods often have quite unacceptable authentication performance and/or small key spaces and therefore are not viable in practice. The purpose of this paper is to propose a novel method which can reliably generate long keys while requires storage of neither biometric templates nor encryption keys. Design/methodology/approach ? This proposition is achieved by devising the use of fingerprint orientation fields for key generation. Additionally, the keys produced are not permanently linked to the orientation fields, hence, allowing them to be replaced in the event of key compromise. Findings ? The evaluation demonstrates that the proposed method for dynamic key generation can offer both good reliability and security in practice, and outperforms other related methods. Originality/value ? In this paper, the authors propose a novel method which can reliably generate long keys while requires storage of neither biometric templates nor encryption keys. This is achieved by devising the use of fingerprint orientation fields for key generation. Additionally, the keys produced are not permanently linked to the orientation fields, hence, allowing them to be replaced in the event of key compromise.

Item Type: Article
DOI/Identification number: 10.1108/09685221211247307
Uncontrolled keywords: Authentication; Biometrics; Data security; Fingerprints; Privacy; Security
Subjects: T Technology
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Engineering and Digital Arts
Depositing User: Tina Thompson
Date Deposited: 22 Oct 2013 08:57 UTC
Last Modified: 16 Nov 2021 10:12 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/35565 (The current URI for this page, for reference purposes)

University of Kent Author Information

Sheng, Weiguo.

Creator's ORCID:
CReDIT Contributor Roles:

Howells, Gareth.

Creator's ORCID: https://orcid.org/0000-0001-5590-0880
CReDIT Contributor Roles:

Fairhurst, Michael.

Creator's ORCID:
CReDIT Contributor Roles:

Deravi, Farzin.

Creator's ORCID: https://orcid.org/0000-0003-0885-437X
CReDIT Contributor Roles:
  • Depositors only (login required):

Total unique views for this document in KAR since July 2020. For more details click on the image.