Fuzzy vault sharing method based on fingerprint characteristic and finite multiplicative group

A technology that blurs the characteristics of vaults and fingerprints, applied in the field of pattern recognition and cryptography, and can solve the problem of loss or theft of storage media.

Inactive Publication Date: 2014-10-15
HANGZHOU DIANZI UNIV
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Storage media at risk of loss or theft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fuzzy vault sharing method based on fingerprint characteristic and finite multiplicative group
  • Fuzzy vault sharing method based on fingerprint characteristic and finite multiplicative group
  • Fuzzy vault sharing method based on fingerprint characteristic and finite multiplicative group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be further described below in conjunction with accompanying drawing.

[0051] 1. The detailed process of binding the shared key to the shared fingerprint fuzzy vault is as follows:

[0052] 1.1. If figure 1 As shown, user 1 Alice and user 2 Bob jointly select a large prime number p, and select g as the multiplicative group A generator in . Alice secretly selects an integer a: 2≤a≤p-1, and calculates g a mod p, sent to Bob. Bob secretly selects an integer b: 2≤b≤p-1, and calculates g b mod p, sent to Alice. Suppose Alice and Bob want to generate a 128-bit shared secret. because (g a ) b =g ab =(g b ) a , so Alice and Bob can calculate H((g b ) a mod p) and H((g a ) b mod p) to obtain the shared key k. Among them, H(·) is selected to generate a 128-bit hash function. At the same time, Alice and Bob respectively enter their personal registered user names, which are recorded as User 1 , User 2 .

[0053] 1.2. From the prev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a fuzzy vault sharing method based on a fingerprint characteristic and a finite multiplicative group. Existing methods have a problem that two parties need to store different fuzzy vaults. According to the fuzzy vault sharing method, the shared information generation stage is that the shared information is obtained by utilizing a designated exchange method via conversion of fingerprint information of the two parties; the shared secret key binding stage is that the shared information generated by conversion and then exchange of the fingerprint information is bound with a shared secret key generated via a Diffie-Hellman secret key exchange protocol so that a shared fuzzy vault is generated; and the shared secret key releasing stage is that the shared information is constructed again via conversion of the fingerprint information of the two parties, the fuzzy vault is unlocked and the shared secret key is recovered. The shared secret key is protected by utilizing a fingerprint fuzzy vault algorithm, the number of the fuzzy vaults is reduced to one, and the shared secret key bound in the shared fingerprint fuzzy vault can only be released via verification of the two parties so that the fuzzy vault sharing method has better security.

Description

technical field [0001] The invention belongs to the technical fields of pattern recognition and cryptography, and in particular relates to a Diffie-Hellman key exchange scheme on a finite multiplication group and a shared fingerprint fuzzy treasury scheme for automatic alignment. Background technique [0002] The Diffie-Hellman key exchange scheme is a type of key agreement. The Diffie-Hellman key exchange scheme is a method of establishing a shared secret, not an encryption method. However, the Diffie-Hellman key exchange scheme allows two parties to jointly establish a shared secret key that can be used for encryption, further key management, or other encryption methods without prior knowledge of the other party. Storing keys securely is one of the most important steps. Typically, the key is stored on the user's computer, smart card, or other medium. Although these media can protect the keys in the media by setting user passwords, the user's passwords can be obtained by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 游林陈宇磊王毓娜张欢欢邓颀
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products