Advanced SearchSearch Tips
Matchmaker: Fuzzy Vault Scheme for Weighted Preference
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Matchmaker: Fuzzy Vault Scheme for Weighted Preference
Purevsuren, Tuvshinkhuu; Kang, Jeonil; Nyang, DaeHun; Lee, KyungHee;
  PDF(new window)
Juels and Sudan`s fuzzy vault scheme has been applied to various researches due to its error-tolerance property. However, the fuzzy vault scheme does not consider the difference between people`s preferences, even though the authors instantiated movie lover` case in their paper. On the other hand, to make secure and high performance face authentication system, Nyang and Lee introduced a face authentication system, so-called fuzzy face vault, that has a specially designed association structure between face features and ordinary fuzzy vault in order to let each face feature have different weight. However, because of optimizing intra/inter class difference of underlying feature extraction methods, we can easily expect that the face authentication system does not successfully decrease the face authentication failure. In this paper, for ensuring the flexible use of the fuzzy vault scheme, we introduce the bucket structure, which differently implements the weighting idea of Nyang and Lee`s face authentication system, and three distribution functions, which formalize the relation between user`s weight of preferences and system implementation. In addition, we suggest a matchmaker scheme based on them and confirm its computational performance through the movie database.
Reed-Solomon decoding;Berlekamp-Welch algorithm;weighted fuzzy vault;matchmaker;
 Cited by
A. Juels and M. Sudan, "A fuzzy vault scheme," Proceedings of IEEE International Symposium on Information Theory (ISIT), p. 408, Jun 2002.

K. Nandakumar, A.K. Jain, and S. Pankanti, "Fingerprint-Based Fuzzy Vault: Implementation and Performance," IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 744-757, Dec. 2007. crossref(new window)

A.-Y. Kim and S.-H. Lee, "Authentication Protocol using Fuzzy Eigenface Vault based on MoC," Proceedings of International Conference on Advanced Communication Technology, vol. 3, pp. 1771-1775, Feb. 2007.

G.X. Qiao and H.A. Qun, "The Automatic Fuzzy Fingerprint Vault Based on Geometric Hashing: Vulnerability Analysis and Security Enhancement," Proceedings of 2009 International Conference on Multimedia Information Networking and Security (MINES), vol. 1, pp. 18-20, Nov. 2009.

D. Moon, S. Lee, Y. Chung, S.B. Pan, and K. Moon, "Implementation of automatic fuzzy fingerprint vault," Proceedings of International Conference on Machine Learning and Cybernetics, vol. 7, pp. 3781-3786, Jul. 2008.

S. Lee, and D. Moon, H. Choi, and Y. Chung, "Memory-Efficient Fuzzy Fingerprint Vault based on the Geometric Hashing," Proceedings of International Conference on Information Security and Assurance (ISA), pp. 312-315, Apr. 2008.

D. Moon, W. Choi, K. Moon, and Y. Chung, "Fuzzy fingerprint vault using multiple polynomials," Proceedings of IEEE International Symposium on Consumer Electronics (ISCE), pp. 290-293, May 2009.

L. Wu, and S. Yuan, "A Face Based Fuzzy Vault Scheme for Secure Online Authentication," Proceedings of International Symposium on Data, Privacy and E-Commerce (ISDPE), pp. 45-49, Sep. 2010.

V. Joshi and P. Sanghavi, "Three tier data storage security in cloud using Face fuzzy vault," Proceedings of International Conference on Computing, Communication and Applications (ICCCA), pp. 1-6, Feb. 2012

D. Moon, Y. Chung, C. Seo, and S.Y. Kim, "A practical implementation of fuzzy fingerprint vault for smart cards," Journal of intelligent Manufacturing, vol. 25, pp. 293-302, Apr. 2014. crossref(new window)

M.T. Nguyen, Q.H. Truong, and T.K. Dang, "Enhance fuzzy vault security using nonrandom chaff point generator," Information Processing Letters, vol. 116, no. 1, pp. 53-64, Jan. 2016. crossref(new window)

D. Nyang and K. Lee, "Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features," Proc. of International Conference on Human-Computer Interaction, HCII 2007, LNCS 4554, pp. 491-496, 2007.

I.S. Reed and G. Solomon, "Polynomial Codes over Certain Finite Fields," Journal of the Society for Industrial and Applied Mathematics (SIAM), vol. 8, no. 2, pp. 300-304, 1960 crossref(new window)

J.L. Massey, "Shift-register synthesis and BCH decoding," IEEE Transactions on Information Theory, vol. IT-15, no. 1, pp. 122-127, 1969.

L.R. Welch and E.R. Berlekamp, "Error Correction for Algebraic Block Codes," US 4,633,470, Dec. 30, 1986.

Y. Sugiyama, M. Kasahara, S. Hirasawa, and T. Namekawa, "A method for solving key equation for decoding Goppa codes," Information and Control, Vol.27, pp. 87-99, 1975. crossref(new window)

S. Gao, "A new algorithm for decoding Reed-Solomon codes," Proceedings of Communications, Information and Network Security, pp. 55-68, Dec. 2002.

C. Ellison, "Emergency Key Recovery without Third Parties," talk given at the Crypto '96 rump session, Aug. 1996.