Fingerprint fuzzy vault method based on (k, w) threshold secret sharing scheme

A technology for fuzzy vaults and threshold secrets, applied in the fields of pattern recognition and cryptography, which can solve problems such as hidden security risks of subkeys

Inactive Publication Date: 2015-07-15
海宁鼎丞智能设备有限公司
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This idea of ​​decentralized key management makes key management more secure and flexible, but each member's subkey has security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fingerprint fuzzy vault method based on (k, w) threshold secret sharing scheme
  • Fingerprint fuzzy vault method based on (k, w) threshold secret sharing scheme
  • Fingerprint fuzzy vault method based on (k, w) threshold secret sharing scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described below in conjunction with accompanying drawing.

[0046] Described shared key distribution stage is specifically as follows (such as figure 1 shown):

[0047] 1. The binding process of fingerprint fuzzy vault and user sub-key

[0048] Step 1.w users respectively input personal registered user names and fingerprints. Part of the fingerprint images in the fingerprint database for testing are as follows: image 3 . A series of preprocessing operations such as segmentation, direction field and gradient calculation, equalization, convergence, smoothing, enhancement, binarization, and thinning are performed on the fingerprint image to obtain a clear binary image that maintains fingerprint feature information. Then extract all the feature points in the image, filter and remove the false feature points, and keep the real feature points of the original image, such as Figure 4 shown.

[0049] Step 2. Linearly map the plane co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a fingerprint fuzzy vault method based on a threshold secret sharing scheme. The method comprises a shared key distribution phase and a shared key reconstruction phase. The shared key distribution phase further comprises a binding process of the fingerprint fuzzy vault and a user subkey, and a shared key binding process. The shared key reconstruction phase further comprises a releasing process of partial user subkeys and a releasing process of the shared key. When the fingerprint fuzzy vault method is used to protect the shared key, the shared key is safely and conveniently released through fingerprint characteristics of the user. The releasing process of the key is very simple, and thus the key sharing scheme is more practical.

Description

technical field [0001] The invention belongs to the technical field of pattern recognition and cryptography, and in particular relates to a (k, w) threshold secret sharing scheme and a fingerprint fuzzy vault scheme for automatic alignment. Background technique [0002] Secret sharing is a very important branch in the field of modern cryptography, and it is also an important research content in the direction of information security. In 1979, Shamir and Blakley independently proposed the concept of key decentralized management, and the mechanism to realize this idea is called (k,w)-threshold scheme. The scheme is to divide a key (called the shared key) into w parts (called w sub-keys or shadows, which are respectively handed over to w individuals for safekeeping, so that the certain integer k<w) satisfies: (1) in Among these w individuals, any r (r≥k) individuals can use their subkeys to recover the shared key; (2) any k-1 individuals can cooperate to recover the shared k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08G06K9/00
Inventor 游林范萌生林刚王升国陆捷
Owner 海宁鼎丞智能设备有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products