Face recognition method and system based on public key and capable of performing ciphertext comparison
A face recognition and public key technology, applied in the field of face recognition, to achieve the effect of ensuring the indistinguishability of trapdoors and ciphertext
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] refer to figure 1 , a face recognition method based on public key ciphertext comparison, comprising the following steps:
[0060]Step 1: Generate the global parameter SGP, and the global parameter SGP is generated in the trusted center. The face acquisition end used to collect face features randomly generates at least two secret values (x 1 ,x 2 ), and for the two secret values (x 1 ,x 2 ) to generate the corresponding public key and get the public key pair PK s =(PK 1s , PK 2s ), ie x 1 The public key is PK 1s , x 2 The public key is PK 2s . The face recognition end randomly generates at least two secret values (y 1 ,y 2 ), two secret values (y 1 ,y 2 ) as the private key of the face recognition terminal, for the two password values (y 1 ,y 2 ) to generate the public key set PK r =(PK 1r , PK 2r ), that is, y 1 The public key is PK 1r ,y 2 The public key is PK 2r . Among them, there is 1 face collection terminal, and there are usually...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


