Strategic Information Splitting Using Biometric Patterns

Provided by: AGH-University of Science and Technology
Topic: Security
Format: PDF
In this paper, the authors proposed a new algorithm for secure strategic information sharing using biometric information. In classic cryptographic threshold schemes used for secret splitting and sharing there aren't any connection between generated shares and particular participants of threshold protocol. In fact sometimes it may be useful to generate a special personalized shadows, which allow not only reveal the original secret information, but also to identify who is the owner of particular shares or information shadow.

Find By Topic