Generating and sharing biometrics based session keys for secure cryptographic applications.
Sanjay Ganesh KanadeDijana Petrovska-DelacrétazBernadette DorizziPublished in: BTAS (2010)
Keyphrases
- key management
- encryption scheme
- secret key
- hash functions
- security protocols
- security properties
- smart card
- encryption key
- public key encryption
- secure communication
- cryptographic protocols
- key establishment
- key agreement
- stream cipher
- factor authentication
- digital signature
- security requirements
- data sharing
- private key
- security analysis
- public key
- information sharing
- public key cryptography
- cryptographic algorithms
- authentication scheme
- diffie hellman
- fuzzy vault
- security services
- authentication protocol
- biometric authentication
- pattern recognition
- identity based encryption
- knowledge sharing
- elliptic curve cryptography
- key management scheme
- personal identification
- cca secure
- provably secure
- biometric data
- ciphertext
- wireless sensor networks
- standard model
- security level
- homomorphic encryption
- ad hoc networks