Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fuzzy Vault encrypting method based on secrete sharing

A technology of secret sharing and encryption method, applied in the field of Fuzzy Vault encryption based on secret sharing, which can solve the problems of message deadlock, tampering and destruction, and expansion of feature space, so as to improve system security performance, avoid message deadlock, and avoid information deadlock. lock effect

Inactive Publication Date: 2009-10-07
XIDIAN UNIV
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. When the fingerprint detail point information cannot be obtained, the message is deadlocked;
[0007] 2. Obtaining a single fingerprint detail point information can restore the message, which poses a potential threat to the fingerprint detail point information;
[0008] 3. The acquisition of information cannot be restricted by other factors;
[0009] 4. Using the same fingerprint minutiae information to compare the Vault sets of different Fuzzy Vault systems can obtain fingerprint minutiae information, and there is a cross-comparison security vulnerability
[0010] The method of introducing multi-biometric feature recognition technology into the Fuzzy Vault system solves the message deadlock problem to a certain extent, but there are differences in the role of each biometric feature on system security in the framework, that is, when a strong factor is introduced, the strong factor can Complete the decryption process directly; because the secret sharing strategy is based on the feature level, the feature space expands, which is not conducive to its expansion; at the same time, it only generates a single Vault set, which is easy to be tampered and destroyed by attackers
[0011] The traditional secret sharing method realizes the effective protection and management of keys and information in the digital space based on digital identities, but because there is no fundamental connection between the digital identities and physical identities it uses, it becomes the biggest threat to information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fuzzy Vault encrypting method based on secrete sharing
  • Fuzzy Vault encrypting method based on secrete sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The flow of the secret sharing-based Fuzzy Vault encryption method of the present invention is divided into two parts: an encryption process and a decryption process. figure 1 It is the process of encrypting messages with the method of the present invention; figure 2 It is the process of encrypting messages with the method of the present invention.

[0035] Such as figure 1 As shown, the message sender of the present invention generates the master encryption key and the master decryption key, encrypts the message with the master encryption key, and each of the n message receivers who share the message provides its fingerprint detail point information combined with the secret sharing method binding sub decryption key. In the encryption process, the input information is the n fingerprint detail point information of the n recipients of the shared message and the message to be encrypted. The steps of the encryption process are as follows:

[0036] 1) The sender of the m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a Fuzzy Vault encrypting method based on secrete sharing. The method combines Fuzzy Vault and a secrete-sharing system to protect messages. In the process of encryption, the sender generates a master encryption key and a master decryption key; the master encryption key encrypts a message and makes use of the master decryption key to produce n sub decryption keys via the secrete sharing system; and n receivers sharing messages respectively provide a group of fingerprint minutiae information sets and construct n Fuzzy Vault systems to bind the sub decryption key. In the process of decryption, when m receivers sharing messages provide fingerprint minutiae information sets used in the process of encryption and input the minutiae information sets into the corresponding Fuzzy Vault systems in encryption to decrypt and recover m sub decryption keys, the secrete sharing system uses the m sub decryption keys to recover the master decryption key. The Fuzzy Vault encrypting method solves the problem of message deadlock in Fuzzy Vault systems of single biological trait, realizes the indirect protection over fingerprint minutiae information, and effectively protects the safety of shared information.

Description

technical field [0001] The present invention relates to the technical fields of information security and biological feature identification, and proposes an encryption method for overcoming message deadlock based on a single biological feature encryption method and improving the security of a traditional secret sharing system based on digital identity, specifically an encryption method based on secret sharing The key binding framework for biometric encryption can be applied to fields such as network and information security, biometric authentication, and biometric encryption. Background technique [0002] Fast and reliable identity authentication is a key issue for the widespread application of digitization and networking of information. Early identity authentication used digital identities as the basis, and there was a danger that digital identities could be easily stolen. On this premise, biometric technology was introduced into the traditional identity authentication syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 梁继民陈宏涛田捷庞辽军谢敏赵恒张毅秦伟屈晓超
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products