Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fingerprint fuzzy vault method based on (k, w) threshold secret sharing scheme

A fuzzy treasury, threshold secret technology, applied in the field of pattern recognition and cryptography, can solve the hidden dangers of subkey security and other issues

Active Publication Date: 2013-02-27
海宁鼎丞智能设备有限公司
View PDF1 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This idea of ​​decentralized key management makes key management more secure and flexible, but each member's subkey has security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fingerprint fuzzy vault method based on (k, w) threshold secret sharing scheme
  • Fingerprint fuzzy vault method based on (k, w) threshold secret sharing scheme
  • Fingerprint fuzzy vault method based on (k, w) threshold secret sharing scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described below in conjunction with accompanying drawing.

[0046] The details of the shared key distribution stage are as follows (such as figure 1 shown):

[0047] 1. The binding process of fingerprint fuzzy vault and user sub-key

[0048] step 1. Each user enters their personal registered user name and fingerprint respectively. Part of the fingerprint images in the fingerprint database for testing are as follows: image 3 . A series of preprocessing operations such as segmentation, direction field and gradient calculation, equalization, convergence, smoothing, enhancement, binarization, and thinning are performed on the fingerprint image to obtain a clear binary image that maintains fingerprint feature information. Then extract all the feature points in the image, filter and remove the false feature points, and keep the real feature points of the original image, such as Figure 4 shown.

[0049] Step 2. Linearly map the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a fingerprint fuzzy vault method based on a threshold secret sharing scheme. The method comprises a shared key distribution phase and a shared key reconstruction phase. The shared key distribution phase further comprises a binding process of the fingerprint fuzzy vault and a user subkey, and a shared key binding process. The shared key reconstruction phase further comprises a releasing process of partial user subkeys and a releasing process of the shared key. When the fingerprint fuzzy vault method is used to protect the shared key, the shared key is safely and conveniently released through fingerprint characteristics of the user. The releasing process of the key is very simple, and thus the key sharing scheme is more practical.

Description

technical field [0001] The invention belongs to the technical field of pattern recognition and cryptography, and specifically relates to a Threshold Secret Sharing Scheme and Automatically Aligned Fingerprint Fuzzy Vault Scheme. Background technique [0002] Secret sharing is a very important branch in the field of modern cryptography, and it is also an important research content in the direction of information security. In 1979, Shamir and Blakley independently proposed the concept of key decentralized management, and the mechanism to realize this idea is called -Threshold scheme. The scheme is to divide a key (called the shared key) into parts (called subkeys or shadows, assigned to personal custody, making sure that the entire ) to satisfy: (1) in this individual, any ( ) Individuals can use their subkeys to recover the shared key; (2) any Individual collaboration does nothing to recover the shared secret. This idea of ​​decentralized key management m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08G06K9/00
Inventor 游林范萌生林刚王升国陆捷
Owner 海宁鼎丞智能设备有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products