Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Signcryption method of biological features of a plurality of receivers

A biometric, multi-receiver technology, applied in the computer field, can solve problems such as low decryption efficiency and sender identity confirmation

Inactive Publication Date: 2012-10-03
XIDIAN UNIV
View PDF4 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to overcome the problems of the above-mentioned prior art that each user needs to securely store the key when performing secure broadcasting, confirm the identity of the sender during decryption, and have low decryption efficiency, and provide a multi-receiver biometric feature combined with fuzzy extraction technology Signcryption method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signcryption method of biological features of a plurality of receivers
  • Signcryption method of biological features of a plurality of receivers
  • Signcryption method of biological features of a plurality of receivers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] Attached below figure 1 The present invention is further described.

[0065] Step 1, system parameter generation

[0066] The key generation center selects a large prime number q (q>2 κ ), construct two additive cyclic groups G of order q 1 and the multiplicative cyclic group G 2 ; and construct a bilinear map, e:G 1 ×G 1 →G 2 ; from group G 1 Randomly select the generator P, and randomly select the system master key and an element P 0 ∈ G 1 , calculate the corresponding system public key P pub =sP; Construct 5 cryptographic one-way hash functions, recorded as: H 1 : { 0,1 } i × { 0,1 } * → z q * ; H 2 : {...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a signcryption method of biological features of a plurality of receivers, comprising generating system parameters; extracting features; performing user log-on; encrypting by a sender; and decrypting by receivers. The method employs fuzzy extractor technique to bind the biological features and user keys to protect keys, directly authenticates user identity through the biological features, solves the safety problems of key safety and key abuse in the conventional cryptography, adds digital signature of senders during encryption, verifies identity of senders through certification during decryption, and solves the problem of counterfeiting of senders. The method improves the safety and reliability of whole systems, has the advantages of high safety, high efficiency and no need for storing any secret information by users, and can be applied to the distributed network application field.

Description

technical field [0001] The invention belongs to the technical field of computers, and further relates to a multi-receiver biometric signcryption method in the technical field of network security. The present invention is a multi-receiver biometrics (such as fingerprint, iris, face, etc.) signcryption method, that is, the ciphertext obtained by the message sender using his own biometrics to encrypt, each authorized recipient can use Its biometrics decrypt the ciphertext. The invention can be used in distributed network applications, and solves the security issues of network service providers broadcasting messages to all authorized users in the network, the security issues of private keys of all authorized users, and the issues of receivers confirming the sender's identity. Background technique [0002] In distributed network applications (such as network conferences, round table conferences, pay TV, etc.), in order to ensure that only authorized users in the system can recei...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 庞辽军张鹏曹凯
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products