A key agreement scheme for smart cards using biometrics

Bhaskar Mondal, Anirban Bhowmick, Tanupriya Choudhury, Tarni Mandal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Locking the cryptographic key is as imperative as the security of the confidential data. A secure key agreement protocol ensures a secure session between two or more parties. Once a key has been shared, the users can communicate resourcefully. The authors look to certify secure key sharing making use of a transmitter engendered vth order polynomial and the users personal biometrics like fingerprints. Genuine points are generated, using the key and the biometrics, which lie on the polynomial. Chaff points are added in order to upsurge confusion and augment security. These points united with the Message Authentication Code (MAC) of the key and timestamp form the fuzzy vault which is communicated to the other end. The receiver needs to select the genuine points using the biometric features to retrieve the cryptographic key.

Original languageEnglish
Title of host publicationProceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1011-1015
Number of pages5
ISBN (Electronic)9781509016662
DOIs
Publication statusPublished - 10-01-2017
Externally publishedYes
Event2016 IEEE International Conference on Computing, Communication and Automation, ICCCA 2016 - Greater Noida, India
Duration: 29-04-201630-04-2016

Conference

Conference2016 IEEE International Conference on Computing, Communication and Automation, ICCCA 2016
CountryIndia
CityGreater Noida
Period29-04-1630-04-16

Fingerprint

Key Agreement
Smart cards
Smart Card
Biometrics
Polynomials
Authentication
Transmitters
Message Authentication Code
Key Agreement Protocol
Polynomial
Timestamp
Locking
Fingerprint
Transmitter
Sharing
Receiver

All Science Journal Classification (ASJC) codes

  • Computational Mathematics
  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture

Cite this

Mondal, B., Bhowmick, A., Choudhury, T., & Mandal, T. (2017). A key agreement scheme for smart cards using biometrics. In Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016 (pp. 1011-1015). [7813863] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CCAA.2016.7813863
Mondal, Bhaskar ; Bhowmick, Anirban ; Choudhury, Tanupriya ; Mandal, Tarni. / A key agreement scheme for smart cards using biometrics. Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016. Institute of Electrical and Electronics Engineers Inc., 2017. pp. 1011-1015
@inproceedings{6e596a55aec844cbb90913e42b8bad94,
title = "A key agreement scheme for smart cards using biometrics",
abstract = "Locking the cryptographic key is as imperative as the security of the confidential data. A secure key agreement protocol ensures a secure session between two or more parties. Once a key has been shared, the users can communicate resourcefully. The authors look to certify secure key sharing making use of a transmitter engendered vth order polynomial and the users personal biometrics like fingerprints. Genuine points are generated, using the key and the biometrics, which lie on the polynomial. Chaff points are added in order to upsurge confusion and augment security. These points united with the Message Authentication Code (MAC) of the key and timestamp form the fuzzy vault which is communicated to the other end. The receiver needs to select the genuine points using the biometric features to retrieve the cryptographic key.",
author = "Bhaskar Mondal and Anirban Bhowmick and Tanupriya Choudhury and Tarni Mandal",
year = "2017",
month = "1",
day = "10",
doi = "10.1109/CCAA.2016.7813863",
language = "English",
pages = "1011--1015",
booktitle = "Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

Mondal, B, Bhowmick, A, Choudhury, T & Mandal, T 2017, A key agreement scheme for smart cards using biometrics. in Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016., 7813863, Institute of Electrical and Electronics Engineers Inc., pp. 1011-1015, 2016 IEEE International Conference on Computing, Communication and Automation, ICCCA 2016, Greater Noida, India, 29-04-16. https://doi.org/10.1109/CCAA.2016.7813863

A key agreement scheme for smart cards using biometrics. / Mondal, Bhaskar; Bhowmick, Anirban; Choudhury, Tanupriya; Mandal, Tarni.

Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016. Institute of Electrical and Electronics Engineers Inc., 2017. p. 1011-1015 7813863.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - A key agreement scheme for smart cards using biometrics

AU - Mondal, Bhaskar

AU - Bhowmick, Anirban

AU - Choudhury, Tanupriya

AU - Mandal, Tarni

PY - 2017/1/10

Y1 - 2017/1/10

N2 - Locking the cryptographic key is as imperative as the security of the confidential data. A secure key agreement protocol ensures a secure session between two or more parties. Once a key has been shared, the users can communicate resourcefully. The authors look to certify secure key sharing making use of a transmitter engendered vth order polynomial and the users personal biometrics like fingerprints. Genuine points are generated, using the key and the biometrics, which lie on the polynomial. Chaff points are added in order to upsurge confusion and augment security. These points united with the Message Authentication Code (MAC) of the key and timestamp form the fuzzy vault which is communicated to the other end. The receiver needs to select the genuine points using the biometric features to retrieve the cryptographic key.

AB - Locking the cryptographic key is as imperative as the security of the confidential data. A secure key agreement protocol ensures a secure session between two or more parties. Once a key has been shared, the users can communicate resourcefully. The authors look to certify secure key sharing making use of a transmitter engendered vth order polynomial and the users personal biometrics like fingerprints. Genuine points are generated, using the key and the biometrics, which lie on the polynomial. Chaff points are added in order to upsurge confusion and augment security. These points united with the Message Authentication Code (MAC) of the key and timestamp form the fuzzy vault which is communicated to the other end. The receiver needs to select the genuine points using the biometric features to retrieve the cryptographic key.

UR - http://www.scopus.com/inward/record.url?scp=85011081834&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85011081834&partnerID=8YFLogxK

U2 - 10.1109/CCAA.2016.7813863

DO - 10.1109/CCAA.2016.7813863

M3 - Conference contribution

SP - 1011

EP - 1015

BT - Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Mondal B, Bhowmick A, Choudhury T, Mandal T. A key agreement scheme for smart cards using biometrics. In Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016. Institute of Electrical and Electronics Engineers Inc. 2017. p. 1011-1015. 7813863 https://doi.org/10.1109/CCAA.2016.7813863