A face recognition method and system based on public key ciphertext comparison
A face recognition and public key technology, applied in the field of face recognition, to ensure the indistinguishability of trapdoors and the indistinguishability of ciphertexts
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] refer to figure 1 and figure 2 , a face recognition method based on public key ciphertext comparison, comprising the following steps:
[0060] Step 1: Generate the global parameter SGP, and the global parameter SGP is generated in the trusted center. The face collection terminal used to collect face features randomly generates at least two secret values (x 1 ,x 2 ), and for the two secret values (x 1 ,x 2 ) to generate the corresponding public key and get the public key pair PK s =(PK 1s ,PK 2s ), i.e. x 1 The public key is PK 1s , x 2 The public key is PK2s . The face recognition terminal randomly generates at least two secret values (y 1 ,y 2 ), two secret values (y 1 ,y 2 ) as the private key of the face recognition terminal, for the two password values (y 1 ,y 2 ) to generate the public key set PK r =(PK 1r ,PK 2r ), i.e. y 1 The public key is PK 1r , y 2 The public key is PK 2r . Among them, there is one face collection terminal,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


