Abstract
In this publication will be proposed a new algorithm for secure information sharing using personal or biometric information. In classic cryptographic threshold schemes used for secret splitting or sharing there aren’t any connection between generated shares and particular participants of communication protocol. Sometimes it may be worth to generate personalized shadows, which allow not only recovery the original information or secret data, but also to identify who exactly took part in the secret reconstruction procedure. In the paper will be described the way of extraction some personal or biometric characteristics using cognitive information systems, as well as the algorithm of application such personal information for shadow generation in threshold schemes. Such new approach may play a great role in intelligent distributed computing or secure urban life.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
References
Adleman, L.M., Rothemund, P.W.K., Roweiss, S., et al.: On applying molecular computation to the Data Encryption Standard. Journal of Computational Biology 6(1), 53–63 (1999)
Blakley, G.R.: Safeguarding Cryptographic Keys. In: Proceedings of the National Computer Conference, pp. 313–317 (1979)
Chomsky, N.: Syntactic Structures, London Mouton (1957)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Waterloo (2001)
Ogiela L.: Semantic Analysis and Biological Modelling in Cognitive Categorization Systems. Mathematical and Computer Modelling (in press, 2013)
Ogiela, L., Ogiela, M.R.: Cognitive Techniques in Visual Data Interpretation. SCI, vol. 228. Springer, Heidelberg (2009)
Ogiela, L., Ogiela, M.R.: Advences in Cognitive Information Systems. COSMOS, vol. 17. Springer, Heidelberg (2012)
Ogiela, M.R., Ogiela, U.: Security of Linguistic Threshold Schemes in Multimedia Systems. In: Damiani, E., Jeong, J., Howlett, R.J., Jain, L.C. (eds.) New Directions in Intelligent Interactive Multimedia Systems and Services - 2. SCI, vol. 226, pp. 13–20. Springer, Heidelberg (2009)
Ogiela, M.R., Ogiela, U.: Shadow Generation Protocol in Linguistic Threshold Schemes. In: Ślęzak, D., Kim, T.-h., Fang, W.-C., Arnett, K.P. (eds.) SecTech 2009. CCIS, vol. 58, pp. 35–42. Springer, Heidelberg (2009)
Ogiela, M.R., Ogiela, U.: The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers and Mathematics with Applications 60(2), 267–271 (2010)
Ogiela, M.R., Ogiela, U.: DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management 32, 175–181 (2012)
Ogiela, M.R., Ogiela, U.: Linguistic Protocols for Secure Information Management and Sharing. Computers and Mathematics with Applications 63(2), 564–572 (2012)
Shamir, A.: How to Share a Secret. Communications of the ACM, 612–613 (1979)
Tang, S.: Simple Secret Sharing and Threshold RSA Signature Schemes. Journal of Information and Computational Science 1, 259–262 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ogiela, M.R., Ogiela, U., Ogiela, L. (2012). Secure Information Sharing Using Personal Biometric Characteristics. In: Kim, Th., Kang, JJ., Grosky, W.I., Arslan, T., Pissinou, N. (eds) Computer Applications for Bio-technology, Multimedia, and Ubiquitous City. BSBT MulGraB IUrC 2012 2012 2012. Communications in Computer and Information Science, vol 353. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35521-9_54
Download citation
DOI: https://doi.org/10.1007/978-3-642-35521-9_54
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35520-2
Online ISBN: 978-3-642-35521-9
eBook Packages: Computer ScienceComputer Science (R0)