Biometric authentication method and system based on elliptic curve and cancellable biometric characteristics
A biometric authentication and biometric technology, applied in the field of biometric authentication privacy protection, can solve the problems of inability to provide forward secrecy, inability to resist user anonymity and impersonation attacks and replay attacks, inability to resist denial of service attacks, etc., to reduce computational complexity performance, small key size, and improved security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] Embodiment 1 of the present invention provides a biometric authentication method for privacy protection based on elliptic curves and revocable biometric certificates.
[0057] In order to enable users to safely access online services and establish secure communications between participants, the security requirements for identity verification are getting higher and higher. Among them, the portability and reliability of biometric authentication are superior to traditional technologies, and are widely used in Various online services face great security risks. By using revocable biometrics to generate revocable pseudo-biometrics and combining them with fuzzy commitments to protect the generated pseudo-biometrics templates, users and Between servers, the elliptic curve is used to establish a secure session key agreement to further improve the privacy protection of biometric authentication.
[0058] It specifically includes the system initialization phase, registration phase,...
Embodiment 2
[0079] In one or more embodiments, the present invention provides a system for privacy-preserving biometric authentication based on elliptic curves and revocable biometric features. Flowchart such as Figure 7 As shown, the system includes client, server, database and smart card, establishes secure communication between client and server, and realizes the following functions.
[0080] (1) Registration stage
[0081] The client sends the user's identity to the server, and stores the converted pseudo-biometric template in the database. The server performs anonymous operations on the user's identity, uses the fuzzy commitment scheme to process the pseudo-biometric template to generate auxiliary data, and stores it in the database. middle.
[0082] (2) Verification stage
[0083] The client user carries the smart card to enter the identity, password and biometric information, uses the same conversion parameters to generate a pseudo-biometric template, and sends it and the anony...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


