{"id":"https://openalex.org/W4212928800","doi":"https://doi.org/10.1007/s40747-022-00663-3","title":"Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication","display_name":"Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication","publication_year":2022,"publication_date":"2022-02-18","ids":{"openalex":"https://openalex.org/W4212928800","doi":"https://doi.org/10.1007/s40747-022-00663-3"},"language":"en","primary_location":{"id":"doi:10.1007/s40747-022-00663-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-022-00663-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-022-00663-3.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s40747-022-00663-3.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109440568","display_name":"K. Suresh","orcid":null},"institutions":[{"id":"https://openalex.org/I122964287","display_name":"National Institute of Technology Tiruchirappalli","ror":"https://ror.org/047x65e68","country_code":"IN","type":"education","lineage":["https://openalex.org/I122964287"]},{"id":"https://openalex.org/I150312865","display_name":"Institute for Development and Research in Banking Technology","ror":"https://ror.org/00ta0g865","country_code":"IN","type":"government","lineage":["https://openalex.org/I150312865"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"K. Suresh","raw_affiliation_strings":["Centre of Excellence in Cyber Security, Institute for Development and Research in Banking Technology, Hyderabad, Telangana, India","Department of Computer Applications, National Institute of Technology, Tiruchirappalli, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Centre of Excellence in Cyber Security, Institute for Development and Research in Banking Technology, Hyderabad, Telangana, India","institution_ids":["https://openalex.org/I150312865"]},{"raw_affiliation_string":"Department of Computer Applications, National Institute of Technology, Tiruchirappalli, Tamil Nadu, India","institution_ids":["https://openalex.org/I122964287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101446368","display_name":"Rajarshi Pal","orcid":"https://orcid.org/0000-0002-5608-7024"},"institutions":[{"id":"https://openalex.org/I150312865","display_name":"Institute for Development and Research in Banking Technology","ror":"https://ror.org/00ta0g865","country_code":"IN","type":"government","lineage":["https://openalex.org/I150312865"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rajarshi Pal","raw_affiliation_strings":["Centre of Excellence in Cyber Security, Institute for Development and Research in Banking Technology, Hyderabad, Telangana, India"],"affiliations":[{"raw_affiliation_string":"Centre of Excellence in Cyber Security, Institute for Development and Research in Banking Technology, Hyderabad, Telangana, India","institution_ids":["https://openalex.org/I150312865"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029024321","display_name":"S. R. Balasundaram","orcid":null},"institutions":[{"id":"https://openalex.org/I122964287","display_name":"National Institute of Technology Tiruchirappalli","ror":"https://ror.org/047x65e68","country_code":"IN","type":"education","lineage":["https://openalex.org/I122964287"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. R. Balasundaram","raw_affiliation_strings":["Department of Computer Applications, National Institute of Technology, Tiruchirappalli, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Applications, National Institute of Technology, Tiruchirappalli, Tamil Nadu, India","institution_ids":["https://openalex.org/I122964287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5109440568"],"corresponding_institution_ids":["https://openalex.org/I122964287","https://openalex.org/I150312865"],"apc_list":{"value":1320,"currency":"GBP","value_usd":1619},"apc_paid":{"value":1320,"currency":"GBP","value_usd":1619},"fwci":2.3797,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.88437553,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"8","issue":"4","first_page":"3247","last_page":"3261"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.67507004737854},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.6438369750976562},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6396764516830444},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5534001588821411},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5307338833808899},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5000550746917725},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.46173369884490967},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.45263445377349854},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.42777884006500244},{"id":"https://openalex.org/keywords/string","display_name":"String (physics)","score":0.42269617319107056},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40976181626319885},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3769899606704712},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33475828170776367},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2141799032688141}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.67507004737854},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.6438369750976562},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6396764516830444},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5534001588821411},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5307338833808899},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5000550746917725},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.46173369884490967},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.45263445377349854},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.42777884006500244},{"id":"https://openalex.org/C157486923","wikidata":"https://www.wikidata.org/wiki/Q1376436","display_name":"String (physics)","level":2,"score":0.42269617319107056},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40976181626319885},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3769899606704712},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33475828170776367},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2141799032688141},{"id":"https://openalex.org/C37914503","wikidata":"https://www.wikidata.org/wiki/Q156495","display_name":"Mathematical physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s40747-022-00663-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-022-00663-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-022-00663-3.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s40747-022-00663-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-022-00663-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-022-00663-3.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4212928800.pdf","grobid_xml":"https://content.openalex.org/works/W4212928800.grobid-xml"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W2000839946","https://openalex.org/W2009601000","https://openalex.org/W2014470493","https://openalex.org/W2018979854","https://openalex.org/W2030653598","https://openalex.org/W2032551902","https://openalex.org/W2091948371","https://openalex.org/W2097566837","https://openalex.org/W2114024372","https://openalex.org/W2129905915","https://openalex.org/W2131183039","https://openalex.org/W2156682179","https://openalex.org/W2159341052","https://openalex.org/W2161240648","https://openalex.org/W2165831888","https://openalex.org/W2262533400","https://openalex.org/W2508889959","https://openalex.org/W2516218154","https://openalex.org/W2535351675","https://openalex.org/W2544326263","https://openalex.org/W2553581720","https://openalex.org/W2571302711","https://openalex.org/W2580028016","https://openalex.org/W2591635389","https://openalex.org/W2644662048","https://openalex.org/W2734592263","https://openalex.org/W2766284463","https://openalex.org/W2770520015","https://openalex.org/W2771944697","https://openalex.org/W2790797818","https://openalex.org/W2889633772","https://openalex.org/W2890042125","https://openalex.org/W2903945686","https://openalex.org/W2935132831","https://openalex.org/W2956222939","https://openalex.org/W2972205077","https://openalex.org/W2983740204","https://openalex.org/W2994908715","https://openalex.org/W2998544248","https://openalex.org/W3003165623","https://openalex.org/W3011865172","https://openalex.org/W3037122293","https://openalex.org/W3046754284","https://openalex.org/W3047197301","https://openalex.org/W3047954424","https://openalex.org/W3083594560","https://openalex.org/W3097087387","https://openalex.org/W3129299566","https://openalex.org/W3160027900","https://openalex.org/W4285226730"],"related_works":["https://openalex.org/W4387934469","https://openalex.org/W2381434979","https://openalex.org/W4229939163","https://openalex.org/W2963735409","https://openalex.org/W3189535762","https://openalex.org/W4285103858","https://openalex.org/W2106970188","https://openalex.org/W2062080653","https://openalex.org/W2254100264","https://openalex.org/W1694516557"],"abstract_inverted_index":{"Abstract":[0],"In":[1],"an":[2],"asymmetric-key":[3],"cryptosystem,":[4],"the":[5,23,35,41,53,72,95,100,108,113,118,133,140,145,150,153,187,194,203,206,217,226,235,239,242],"secure":[6,38],"storage":[7,39],"of":[8,40,76,97,107,132,144,205,225],"private":[9,27,42,190,244],"keys":[10],"is":[11,44,56,69,229,246],"a":[12,18,31,80,83,163,222,255],"challenging":[13],"task.":[14],"This":[15,199],"paper":[16],"proposes":[17],"novel":[19],"approach":[20,50,169,219],"for":[21,37,51],"generating":[22,52],"same":[24,109,134,207],"public":[25,188],"and":[26,63,152,189],"key":[28,43,54,191,196,208,245],"pair":[29,55,192,209],"on":[30,58,254],"need":[32,36,256],"basis.":[33,257],"Hence,":[34,117],"done":[45],"away":[46],"with.":[47],"The":[48,167,212],"proposed":[49,168,218],"based":[57],"two":[59,105,176],"factors:":[60],"fingerprint":[61,81,110,135,151,236],"biometrics":[62],"password.":[64,240],"A":[65],"stable":[66,146,164,223],"binary":[67,114],"string":[68,147,154],"generated":[70,101,141,148,155,243],"from":[71,104,149,156],"distances":[73],"among":[74],"pairs":[75],"minutiae":[77],"points":[78],"in":[79,129,139],"using":[82,193],"gray":[84,90],"code-based":[85],"method.":[86,198],"Experiments":[87],"show":[88,215],"that":[89,216],"code":[91,115,122],"representation":[92],"significantly":[93],"reduces":[94],"number":[96],"inconsistencies":[98],"between":[99],"bit":[102],"strings":[103],"instances":[106,131],"as":[111],"against":[112],"representation.":[116],"Reed\u2013Solomon":[119],"error":[120],"correction":[121],"successfully":[123],"corrects":[124],"errors":[125],"due":[126],"to":[127,136,161,174,185,232],"variations":[128],"multiple":[130],"induce":[137],"stability":[138],"string.":[142],"Hash":[143],"hashed":[157],"password":[158],"are":[159,183],"XORed":[160],"derive":[162],"seed":[165,172,200],"value.":[166],"uses":[170],"this":[171],"value":[173,201],"generate":[175,186],"large":[177],"prime":[178,181],"numbers.":[179],"These":[180],"numbers":[182],"used":[184],"RSA":[195],"generation":[197,204,224],"ensures":[202],"every":[210],"time.":[211],"experimental":[213],"results":[214],"can":[220,251],"ensure":[221],"key.":[227],"It":[228,250],"not":[230,248],"required":[231],"store":[233],"either":[234],"template":[237],"or":[238],"Moreover,":[241],"also":[247],"stored.":[249],"be":[252],"regenerated":[253]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
