Private key encryption and recovery in blockchain

The disruptive technology of blockchain can deliver secure solutions without the need for a central authority. In blockchain, assets that belong to a participant are controlled through the private key of an asymmetric key pair that is owned by the participant. Although, this lets blockchain network participants to have sovereignty on their assets, it comes with the responsibility of managing their own keys. Currently, there exists two major bottlenecks in managing keys; $a)$ users don't have an efficient and secure way to store their keys, $b)$ no efficient recovery mechanism exists in case the keys are lost. In this study, we propose secure methods to efficiently store and recover keys. For the first, we introduce an efficient encryption mechanism to securely encrypt and decrypt the private key using the owner's biometric signature. For the later, we introduce an efficient recovery mechanism using biometrics and secret sharing scheme. By applying the proposed key encryption and recovery mechanism, asset owners are able to securely store their keys on their devices and recover the keys in case they are lost.

[1]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[2]  B. Chen,et al.  Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).

[3]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[4]  Kms Perera,et al.  Biometric Signatures and Elliptic Curve Cryptography for Internet based Applications , 2017 .

[5]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[6]  Naser Damer,et al.  Fingerprint and Iris Multi-Biometric Data Indexing and Retrieval , 2018, 2018 21st International Conference on Information Fusion (FUSION).

[7]  Chia-Chen Lin,et al.  Biometrics-Based RSA Cryptosystem for Securing Real-Time Communication , 2018, Sustainability.

[8]  Tran Quang Duc,et al.  A Biometrics Encryption Key algorithm to protect private key in BioPKI based security system , 2009, 2009 7th International Conference on Information, Communications and Signal Processing (ICICS).

[9]  Debnath Bhattacharyya,et al.  Biometric Authentication: A Review , 2009 .

[10]  Yen-Lung Lai,et al.  Multimodal Biometrics System Using Feature-Level Fusion of Iris and Fingerprint , 2018, ICAIP '18.

[11]  Rafail Ostrovsky,et al.  Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.

[12]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[13]  R Kavya,et al.  Survey on Encryption Approaches for Secure Face Biometrics , 2018 .

[14]  K. Duraiswamy,et al.  Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris , 2010, ArXiv.

[15]  Chiranji Lal Chowdhary Analysis of Unimodal and Multimodal Biometric System , 2019 .

[16]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[17]  Michaël Rusinowitch,et al.  Automated Verification of Electrum Wallet , 2016, Financial Cryptography Workshops.

[18]  Anil K. Jain,et al.  Fingerprint Image Enhancement: Algorithm and Performance Evaluation , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[19]  A. Lynn Abbott,et al.  Biometric authentication using photoplethysmography signals , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[20]  Taekyoung Kwon,et al.  Practical Digital Signature Generation Using Biometrics , 2004, ICCSA.

[21]  Neha Bansal Enhanced RSA Key Generation Modelling Using Fingerprint Biometric , 2018 .

[22]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[23]  Akio Tojo,et al.  Fingerprint pattern classification , 1984, Pattern Recognit..

[24]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[25]  Ann Cavoukian,et al.  Biometric Encryption , 2011, Encyclopedia of Cryptography and Security.

[26]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[27]  Mohammed Yakoob Siyal,et al.  Novel biometric digital signatures for Internet-based applications , 2001, Inf. Manag. Comput. Secur..

[28]  Andreas Uhl,et al.  Context-based biometric key generation for Iris , 2011 .

[29]  F. Moore,et al.  Polynomial Codes Over Certain Finite Fields , 2017 .

[30]  Samiran Chattopadhyay,et al.  Fingerprint-based crypto-biometric system for network security , 2015, EURASIP J. Inf. Secur..

[31]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[32]  Ian Michael Trotter,et al.  Mapping Fingerprints to Unique Numbers , 2007 .

[33]  Zarul Fitri Zaaba,et al.  An assessment of user authentication methods in mobile phones , 2018 .

[34]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.