Biometric-Based Linguistic Solutions for Data Encryption and Sharing

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 926)


This paper will describe new hybrid classes of secret sharing protocols joining features of linguistic secret division procedures with biometric threshold schemes. Such advanced protocols will be defined with application of different classes of formal grammars with standard or non-standard biometric patterns. Evaluation of such method will be done, as well as possible application for data and services management will be presented.


Secret sharing protocols Biometric-linguistic threshold schemes Cloud computing Secure service management 



This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.

This work was supported by JSPS KAKENHI grant number 15H0295.


  1. 1.
    Chomsky, N.: Syntactic Structures. Mouton, London (1957)zbMATHGoogle Scholar
  2. 2.
    Gregg, M., Schneier, B.: Security Practitioner and Cryptography Handbook and Study Guide Set. Wiley, Hoboken (2014)Google Scholar
  3. 3.
    Duolikun, D., Aikebaier, A., Enokido, T., Takizawa, M.: Design and evaluation of a quorum-based synchronization protocol of multimedia replicas. Int. J. Ad Hoc Ubiquit. Comput. 17(2/3), 100–109 (2014)CrossRefGoogle Scholar
  4. 4.
    Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: Flexible synchronization protocol to prevent illegal information flow in peer-to-peer publish/subscribe systems. In: Barolli, L., Terzo, O. (eds.) Complex, Intelligent, and Software Intensive Systems. Advances in Intelligent Systems and Computing, vol. 611, pp. 82–93. Springer, Cham (2018)CrossRefGoogle Scholar
  5. 5.
    Ogiela, L.: Cognitive computational intelligence in medical pattern semantic understanding. In: Guo, M.Z., Zhao, L., Wang, L.P. (eds.) Proceedings of Fourth International Conference on Natural Computation, ICNC 2008, 18–20 October 2008, Jian, People’s Republic of China, vol. 6, pp. 245–247 (2008)Google Scholar
  6. 6.
    Ogiela, L.: Cryptographic techniques of strategic data splitting and secure information management. Pervasive Mobile Comput. 29, 130–141 (2016)CrossRefGoogle Scholar
  7. 7.
    Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information management. IEEE Syst. J. 11(2), 405–414 (2017)CrossRefGoogle Scholar
  8. 8.
    Ogiela, M.R. Ogiela, L., Ogiela, U.: Intelligent bio-inspired approach for secrecy management in the cloud. In: Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC, 08–10 November 2014, Guangzhou, People’s Republic of China, pp. 286–289Google Scholar
  9. 9.
    Ogiela, M.R., Ogiela, U.: Secure information splitting using grammar schemes. In: New Challenges in Computational Collective Intelligence: Studies in Computational Intelligence, vol. 244, pp. 327–336 (2009)Google Scholar
  10. 10.
    Ogiela, M.R., Ogiela, U.: Secure information management in hierarchical structures. In: Advanced Computer Science and Information Technology: Communications in Computer and Information Science, vol. 195, pp. 31–35 (2011)Google Scholar
  11. 11.
    Ogiela, U., Takizawa, M., Ogiela, L.: Classification of cognitive service management systems in cloud computing. In: Barolli, L., Xhafa, F., Conesa, J. (eds.). Advances on Broad-Band Wireless Computing, Communication and Applications, BWCCA 2017. Lecture Notes on Data Engineering and Communications Technologies, vol. 12, pp 309–313. Springer, Cham (2018).
  12. 12.
    Yan, S.Y.: Computational Number Theory and Modern Cryptography. Wiley, Hoboken (2013)zbMATHGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Cryptography and Cognitive Informatics Research GroupAGH University of Science and TechnologyKrakówPoland
  2. 2.Department of Advanced SciencesHosei UniversityKoganei-shiJapan
  3. 3.Pedagogical University of CracowKrakówPoland

Personalised recommendations