Secure information sharing using personal biometric characteristics

20Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this publication will be proposed a new algorithm for secure information sharing using personal or biometric information. In classic cryptographic threshold schemes used for secret splitting or sharing there aren't any connection between generated shares and particular participants of communication protocol. Sometimes it may be worth to generate personalized shadows, which allow not only recovery the original information or secret data, but also to identify who exactly took part in the secret reconstruction procedure. In the paper will be described the way of extraction some personal or biometric characteristics using cognitive information systems, as well as the algorithm of application such personal information for shadow generation in threshold schemes. Such new approach may play a great role in intelligent distributed computing or secure urban life. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Ogiela, M. R., Ogiela, U., & Ogiela, L. (2012). Secure information sharing using personal biometric characteristics. In Communications in Computer and Information Science (Vol. 353 CCIS, pp. 369–373). https://doi.org/10.1007/978-3-642-35521-9_54

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free