Fuzzy vault method based on fingerprint features and Internet key exchange protocol

A key exchange protocol, a technology of fuzzy vault, applied in the field of fingerprint fuzzy vault scheme, can solve the problem of loss or theft of storage media

Inactive Publication Date: 2012-10-03
海宁鼎丞智能设备有限公司
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Storage media at risk of loss or theft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fuzzy vault method based on fingerprint features and Internet key exchange protocol
  • Fuzzy vault method based on fingerprint features and Internet key exchange protocol
  • Fuzzy vault method based on fingerprint features and Internet key exchange protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The present invention will be further described below in conjunction with accompanying drawing.

[0059] 1. The detailed process of shared key binding:

[0060] 1.1. If figure 1 As shown, user 1 Alice and user 2 Bob select a large prime number , and select for multiplying group A generator in . Alice secretly chooses an integer : , and calculate . send to Bob. Bob secretly chooses an integer : , and calculate . send to Alice. Suppose Alice and Bob want to generate a 128-bit shared key. Thus, Alice calculates , Bob calculates , selected is a hash function that generates a 128-bit number. Two users get a shared secret . Alice and Bob respectively input their personal registered user names, denoted as , .

[0061] 1.2. A shared secret is created by the Diffie-Hellman key exchange protocol . The number with a length of 128 bits is used as a coefficient of the polynomial at intervals of 16 bits, and the coefficients of the 1st ord...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a fuzzy vault method based on fingerprint features and an Internet key exchange protocol. The existing method has the problems that security storage users share one key. The method comprises the steps of a shared key generation step of a diffie-hellman key exchange protocol and a binding and releasing step of a finger fuzzy vault and the shared key, wherein the shared key generation step is that the shared key is generated on the basis of the Diffie-Hellman protocol. The binding step of the fingerprint fuzzy vault and the shared key is that original fingerprint information is adopted as a polynomial element, and a polynomial is constructed by utilizing the shared key. The releasing step of the fingerprint fuzzy vault and the shared key is that the polynomial is reconstructed by inquiring the fingerprint information, and the shared key is restored. Due to the adoption of the fingerprint fuzzy vault algorithm, while the shared key is protected, the shared key can be safely and conveniently released through the fingerprint features of the user, so that the key sharing scheme has better practicability.

Description

technical field [0001] The invention belongs to the technical field of pattern recognition and cryptography, and in particular relates to a Diffie-Hellman key exchange scheme and an automatic aligned fingerprint fuzzy vault scheme. Background technique [0002] A key sharing scheme or Diffie-Hellman key exchange scheme is a type of key agreement. The Diffie-Hellman key exchange scheme is a method of establishing a shared secret, not an encryption method. However, the Diffie-Hellman exchange technique allows two parties to jointly establish a shared secret key that can be used for encryption, further key management or other encryption methods without prior knowledge of the other party. Securely storing shared keys between users is a problem. In cryptographic systems, storing keys securely is one of the most important steps. Typically, the key is stored on the user's computer, smart card or other medium. Although these media can protect the keys in the media by setting use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06K9/00
CPCG09C1/00
Inventor 游林范萌生王升国
Owner 海宁鼎丞智能设备有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products