Biological characteristic sensitive information outsourcing identity authentication method based on homomorphic encryption

A biometric information and biometric technology, applied in the field of identity authentication solutions, can solve the problems of inability to provide high-strength security protection, security risks, etc., and achieve high-security and high-efficiency biometric authentication services, high security, resistance to a variety of The effect of means of attack

Active Publication Date: 2018-04-17
HANGZHOU DIANZI UNIV
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Neither traditional biometric authentication nor biometric encryption technology and biometric transformation technology can provide high-strength security protection in application scenarios where biometrics are outsourced to cloud servers.
[0006] In summary, the existing biometric authentication technology and protection measures still have certain security risks. In the context of big data, it is necessary to develop biometric authentication technology with higher security strength.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biological characteristic sensitive information outsourcing identity authentication method based on homomorphic encryption
  • Biological characteristic sensitive information outsourcing identity authentication method based on homomorphic encryption
  • Biological characteristic sensitive information outsourcing identity authentication method based on homomorphic encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further described below in conjunction with accompanying drawing.

[0041] The flow chart of the traditional biometric-based identity authentication system is as follows: figure 1 As shown, the protection of biometric data is weak and the security is low.

[0042] The present invention provides a biometric sensitive information outsourced identity authentication method based on homomorphic encryption. The schematic diagram of the system structure is as follows figure 2As shown, the specific implementation mainly includes three parts:

[0043] Step 1. The flow chart of the registration phase is as follows: image 3 As shown, the client uses the message encoding method I to process the user's original n-dimensional biometric vector T to obtain the packaged biometric information P(T), and encrypts it with the Somewhat homomorphic encryption method based on RLWE to obtain the ciphertext ct pack (T), the server generates an n-dimensional ran...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a biological characteristic sensitive information outsourcing identity authentication method based on homomorphic encryption, to provide users with a more secure identity authentication method based on biological characteristics. Compared with a traditional biological characteristic authentication method, the method includes a Somewhat homomorphic encryption method based on RLWE construction and a message coding method, which can conduct fast computation processing on the biological characteristic information after user encryption, and effectively solve the secure privacy problem brought by data outsourcing. The transmission, storage and computation of user biological characteristic information are under an encrypted state in a register stage and an authenticationstage, and the replay attack can be effectively resisted by the random number bought in a data transmission process. As a result, the method can realize secure identity authentication based on biological characteristic sensitive information outsourcing in the case of user data privacy protection.

Description

technical field [0001] The invention belongs to the technical field of secure biometric authentication and cryptography, and in particular relates to a combination of Somewhat homomorphic encryption technology based on RLWE construction and a message encoding scheme, after packaging and encrypting biometric information, it can be encrypted in the ciphertext domain An authentication scheme for fast similarity calculations. Background technique [0002] Security identity authentication technology is an important guarantee for controlling users to obtain access to key data and enjoy related services, and it is also one of the basic services of information security. Big data technology is a double-edged sword. In the context of the big data era, while users are enjoying the convenient services brought by big data technology, people's information security is also being impacted by various technologies, and users' privacy security has become more vulnerable. , among which identit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/00H04L9/08
CPCH04L9/008H04L9/0866H04L9/0869H04L9/3231
Inventor 游林梁家豪李洵颜春辉程申前闫斌
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products