Abstract
This paper proposes an asymmetric encryption scheme based on fingerprint minutiae. The topology remains unchanged during encryption with round transformation, displacement and rotation operation. Meanwhile, the validity and security is proved. When length of private key is k, the number of round transformation operations for brute-force method can arrive at 2 2k.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Han, F., Hu, J., Yu, X., Wang, Y.: Fingerprint images encryption via multiscroll chaotic attractors. Applied Mathematics and Computation 185(2), 931–939 (2007)
Hong, L., Wan, Y., Jain: Fingerprint image enhancement: algorithm and performance evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence 20(8), 777–789 (2002)
Diffie-Hellman, W.: New direction in cryptography. IEEE Transaction on Information Theory 22(6), 644–654 (1976)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key crypto- systems. Communications of the ACM 21(2), 120–126 (1978)
Gamal, L.: A Public Key Cryptosystem and A Signa- ture Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)
Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48(177), 201–209 (1987)
Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Brown, G.E., Green, A.E.S.: American Journal of Physics 36(4), 371 (1968)
Smid, M.E., Branstad, D.K., NBS, Gaithersburg, M.D.: Data Encryptions Standard: past and future. Proceedings of the IEEE 76(5), 550–559 (1988)
Black, J., Rogaway, P., Shrimpton, T.: Encryption-Scheme Security in the Presence of Key-Dependent Messages. In: van der Hoek, A., Coen-Porisini, A. (eds.) SEM 2002. LNCS, vol. 2596, pp. 62–75. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cui, J., Zhang, X., Yue, G., Liu, H., Lai, Z. (2012). Asymmetric Encryption Scheme Based on Fingerprint Topological Transformation. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-35211-9_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35210-2
Online ISBN: 978-3-642-35211-9
eBook Packages: Computer ScienceComputer Science (R0)