{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T08:56:13Z","timestamp":1760345773185,"version":"3.41.2"},"reference-count":15,"publisher":"Emerald","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005,2,1]]},"abstract":"<jats:sec>\n                  <jats:title>Purpose<\/jats:title>\n                  <jats:p>To devise a biometric-based mechanism for enhancing security of private keys used in cryptographic applications.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Design\/methodology\/approach<\/jats:title>\n                  <jats:p>To enhance security of a private key, we propose a scheme that regenerates a user's private key by taking a genuine user's password, fingerprint and a valid smart card. Our scheme uses features extracted from fingerprint along with public key cryptography, cryptographic hash functions and Shamir secret sharing scheme in a novel way to achieve our desired objectives.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Findings<\/jats:title>\n                  <jats:p>Despite changes in the fingerprint pattern each time it is presented, our scheme is sufficiently robust to regenerate a constant private key. As compared to conventional methods of storing a private key merely by password-based encryption, our scheme offers more security as it requires a genuine user's password, fingerprint and a valid smart card. Key lengths up to 1024-bit or even higher can be regenerated making the scheme compatible with the current security requirements of public key cryptosystems.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Research limitations\/implications<\/jats:title>\n                  <jats:p>Minutia points used for image alignment can be incorporated in the key regeneration algorithm for stronger user authentication. In this case, some alternative technique will be required for image alignment.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Practical implications<\/jats:title>\n                  <jats:p>The robustness of our scheme depicts its use in practical systems where there are variations in fingerprint patterns because of sensor noise and alignment issues.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Originality\/value<\/jats:title>\n                  <jats:p>In this paper, we have demonstrated a novel idea of regenerating the private key of a user by using fingerprint, password and a smart card. The basic aim is to provide more security to key storage as compared to traditional methods that uses password-based encryption for secure storage of private keys.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1108\/09685220510582665","type":"journal-article","created":{"date-parts":[[2005,3,21]],"date-time":"2005-03-21T18:44:32Z","timestamp":1111430672000},"page":"39-54","source":"Crossref","is-referenced-by-count":5,"title":["A novel approach for regenerating a private key using password, fingerprint and smart card"],"prefix":"10.1108","volume":"13","author":[{"given":"Fawad","family":"Ahmed","sequence":"first","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore"}]},{"given":"M.Y.","family":"Siyal","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore"}]}],"member":"140","reference":[{"issue":"4","key":"2025072819443315800_b1","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1108\/09685220210436949","article-title":"Private key generation from on-line handwritten signatures","volume":"10","author":"Feng","year":"2002","journal-title":"Information Management & Computer Security"},{"issue":"3","key":"2025072819443315800_b2","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1145\/322510.322514","article-title":"Public-key cryptography and password protocols","volume":"2","author":"Halevi","year":"1999","journal-title":"ACM Transactions on Information and System Security"},{"key":"2025072819443315800_b4","unstructured":"Jain, A.K.\n          , Bolle, R. and Pankanti, S. (Eds) (1999), Biometrics: Personal Identification in a Networked Society, Kluwer Academic Publishers, Dordrecht."},{"issue":"9","key":"2025072819443315800_b3","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1109\/5.628674","article-title":"An identity-authentication system using fingerprints","volume":"85","author":"Jain","year":"1997","journal-title":"Proc. IEEE"},{"key":"2025072819443315800_b5","doi-asserted-by":"crossref","unstructured":"Kocher, P.\n          , Jaffe, J. and Jun, B. (1999), \u201cDifferential power analysis\u201d, CRYPTO 1999, Proceeding, Springer-Verlag, New York, NY, pp. 388-97.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"2025072819443315800_b6","unstructured":"Menezes, A.J.\n          , Oorschot, P.C.V. and Vanstone, S.A. (1996), Handbook of Applied Cryptography, CRC Press, Boca Raton, FL."},{"key":"2025072819443315800_b7","unstructured":"Monrose, F.\n          , Reiter, M.K., Li, Q. and Wetzel, S. (2001), \u201cCryptographic key generation from voice\u201d, Proc. IEEE Symposium on Security and Privacy."},{"key":"2025072819443315800_b8","unstructured":"Nichols, R.K.\n           (1998), ICSA Guide to Cryptography, McGraw-Hill Osborne Media, Emeryville, CA."},{"key":"2025072819443315800_b9","doi-asserted-by":"crossref","unstructured":"Rao, A.R.\n           (1990), A Taxonomy of Texture Description and Identification, Springer-Verlag, New York, NY.","DOI":"10.1007\/978-1-4613-9777-9"},{"key":"2025072819443315800_b10","unstructured":"RSA\n           (2003), RSA Laboratories Frequently Asked Questions About Today's Cryptography, available at: www.rsasecurity.com\/rsalabs\/faq\/3-1-5.html."},{"key":"2025072819443315800_b11","unstructured":"Schneier, B.\n           (1996), Applied Cryptography, 2nd ed., Wiley, New York, NY."},{"issue":"11","key":"2025072819443315800_b12","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Communications of The ACM"},{"key":"2025072819443315800_b13","doi-asserted-by":"crossref","unstructured":"Soutar, C.\n          , Roberge, D., Stoianov, A., Gilroy, R. and Kumar, B.V.K.V. (1998a), \u201cBiometric encryption\u2122 using image processing\u201d, Proc. SPIE, Vol. 3314, pp. 178-88.","DOI":"10.1117\/12.304705"},{"key":"2025072819443315800_b14","doi-asserted-by":"crossref","unstructured":"Soutar, C.\n          , Roberge, D., Stoianov, A., Gilroy, R. and Kumar, B.V.K.V. (1998b), \u201cBiometric encryption\u2122 \u2013 enrollment and verification procedures\u201d, Proc. SPIE, Vol. 3386, pp. 24-35.","DOI":"10.1117\/12.304770"},{"key":"2025072819443315800_b15","unstructured":"Taponen, V.\n           (2000), \u201cTamper-resistant smart cards \u2013 too much to ask for?\u201d, Helsinki University of Technology, Helsinki."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220510582665","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220510582665\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/13\/1\/39\/1201649\/09685220510582665.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/13\/1\/39\/1201649\/09685220510582665.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T23:44:41Z","timestamp":1753746281000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ics\/article\/13\/1\/39\/176739\/A-novel-approach-for-regenerating-a-private-key"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,2,1]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,2,1]]}},"URL":"https:\/\/doi.org\/10.1108\/09685220510582665","relation":{},"ISSN":["0968-5227","1758-5805"],"issn-type":[{"type":"print","value":"0968-5227"},{"type":"electronic","value":"1758-5805"}],"subject":[],"published":{"date-parts":[[2005,2,1]]}}}