Multi-receiver encryption method based on biological characteristics

A biometric and encryption method technology, applied in the field of network security technology, can solve the problems of safe storage of each user, and achieve the effects of improving security and reliability, avoiding security problems, and avoiding key abuse.

Inactive Publication Date: 2011-02-16
XIDIAN UNIV
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Purpose of the present invention: in order to overcome the problem that each user needs to safely keep the key when performing safe broadcasting in the prior art, the present invention provides a multi-recipient encryption method based on biometric features (such as fingerprints, irises, faces, etc.), Using biometrics instead of keys in cryptography, encryptors only need to provide their own biometrics when encrypting messages, and each authorized decryptor can use their own biometrics as a key to decrypt, eliminating the need for each user Save any key information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-receiver encryption method based on biological characteristics
  • Multi-receiver encryption method based on biological characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] attached figure 1 The specific flow of the multi-recipient encryption method based on biometric features (such as fingerprints, irises, faces, etc.) of the present invention is given. Combine below figure 1 A complete biometric-based encryption and decryption process will be described.

[0053] Step 1: TTP establishes system parameters. The system parameters are selected by a trusted third-party TTP, including: two p-order cyclic groups (G 1 , +) and (G 2 , ·), where p is a prime number; P is G 1 Generator of ; let e be G 1 and G 2 The bilinear transformation on , that is, e: G 1 ×G 1 →G 2 ;TTP randomly selects its own private key Its corresponding public key is Q TTP = S TTP P∈G 1 ;Let H( ) be a one-way cryptographic hash function;

[0054] Step 2: Registration process. All users in the system, including: CryptoR 0 and n decryptors R 1 , R 2 ,...,R n , register with the trusted third party TTP, and apply for your own smart card. Encryptors need to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multi-receiver encryption method based on biological characteristics, overcoming various safety problems in secret key saving in the prior art by using the biological characteristics for replaying a secret key. When encrypting, encipherers only need to provide own biological characteristics, each authorized encipherer can use own biological characteristics as the secret key for deciphering without needing to save any secret key information, and meanwhile the identities of users are directly authenticated by using the information of the biological characteristics, thereby the avoidless problem of secret key abuse in cryptology is avoided, and the integral safety and reliability of the system are improved. The method comprises a registering process, an encrypting process and a deciphering process; and in the registering process, all users in the system register in a credible third party to obtain an intelligent card issued by the credible third party; in the encrypting process, the encipherers encrypt the information m through the own biological characteristics so that only authorized decipherers can decipher through the own biological characteristics; and in the deciphering process, each authorized decipherer deciphers the encrypted information through the own biological characteristics to obtain the information m.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to a security technology in which a network service provider broadcasts to all authorized users in the network in a network application, specifically a multi-reception system based on biological characteristics (such as fingerprints, irises, faces, etc.) Encryption method, that is, the ciphertext obtained by the message sender using his own biometrics as the key to encrypt, and each authorized message receiver can use his biometrics to decrypt the ciphertext. Background technique [0002] In distributed network applications (such as network conferences, round table conferences, pay TV, etc.), in order to ensure that only authorized users in the system can receive information correctly, and non-authorized users cannot receive information correctly, secure broadcasting technology is needed as a support. Secure broadcast is a security technology that enables one sender to send t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 庞辽军梁继民田捷赵恒曹凯刘而云陈宏涛
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products