Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Fuzzy Vault Encryption Method Based on Secret Sharing

A technology of secret sharing and encryption method, which is applied in the field of Fuzzy Vault encryption based on secret sharing, which can solve problems such as message deadlock, tampering damage, feature space expansion, etc., to improve system security performance, avoid information deadlock, and avoid message deadlock lock effect

Inactive Publication Date: 2011-12-07
XIDIAN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. When the fingerprint detail point information cannot be obtained, the message is deadlocked;
[0007] 2. Obtaining a single fingerprint detail point information can restore the message, which poses a potential threat to the fingerprint detail point information;
[0008] 3. The acquisition of information cannot be restricted by other factors;
[0009] 4. Using the same fingerprint minutiae information to compare the Vault sets of different Fuzzy Vault systems can obtain fingerprint minutiae information, and there is a cross-comparison security vulnerability
[0010] The method of introducing multi-biometric feature recognition technology into the Fuzzy Vault system solves the message deadlock problem to a certain extent, but there are differences in the role of each biometric feature on system security in the framework, that is, when a strong factor is introduced, the strong factor can Complete the decryption process directly; because the secret sharing strategy is based on the feature level, the feature space expands, which is not conducive to its expansion; at the same time, it only generates a single Vault set, which is easy to be tampered and destroyed by attackers
[0011] The traditional secret sharing method realizes the effective protection and management of keys and information in the digital space based on digital identities, but because there is no fundamental connection between the digital identities and physical identities it uses, it becomes the biggest threat to information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Fuzzy Vault Encryption Method Based on Secret Sharing
  • A Fuzzy Vault Encryption Method Based on Secret Sharing
  • A Fuzzy Vault Encryption Method Based on Secret Sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The flow of the secret sharing-based Fuzzy Vault encryption method of the present invention is divided into two parts: an encryption process and a decryption process. figure 1 It is the process of encrypting messages with the method of the present invention; figure 2 It is the process of encrypting messages with the method of the present invention.

[0035] Such as figure 1 As shown, the message sender of the present invention generates the master encryption key and the master decryption key, encrypts the message with the master encryption key, and the n message receivers who share the message each provide their fingerprint detail point information combined with the secret sharing method binding sub decryption key. In the encryption process, the input information is the n fingerprint detail point information of the n recipients of the shared message and the message to be encrypted. The steps of the encryption process are as follows:

[0036] 1) The sender of the mes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a Fuzzy Vault encryption method based on secret sharing. This method combines Fuzzy Vault and secret sharing system to protect messages. In the encryption process, the sender generates a pair of master encryption key and master decryption key, the master encryption key encrypts the message, and then uses the master decryption key to generate n sub-decryption keys through the secret sharing system, and the n sub-decryption keys shared by the message Each receiver provides a set of its fingerprint detail point information set and constructs n Fuzzy Vault system binding sub-decryption keys. During the decryption process, when the recipients of m shared messages provide the fingerprint minutiae information sets used in the encryption process, and input the respective minutiae information sets into the corresponding Fuzzy Vault system for encryption, m sub-decryption keys are decrypted by The secret sharing system uses m sub-decryption keys to recover the master decryption key. The invention overcomes the message deadlock problem of the Fuzzy Vault system of a single biometric feature; realizes the indirect protection of fingerprint minutiae information; and effectively protects the safety of shared information.

Description

technical field [0001] The present invention relates to the technical fields of information security and biological feature identification, and proposes an encryption method for overcoming message deadlock based on a single biological feature encryption method and improving the security of a traditional secret sharing system based on digital identity, specifically an encryption method based on secret sharing The key binding framework for biometric encryption can be applied to fields such as network and information security, biometric authentication, and biometric encryption. Background technique [0002] Fast and reliable identity authentication is a key issue for the widespread application of digitization and networking of information. Early identity authentication used digital identities as the basis, and there was a danger that digital identities could be easily stolen. On this premise, biometric technology was introduced into the traditional identity authentication syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 梁继民陈宏涛田捷庞辽军谢敏赵恒张毅秦伟屈晓超
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products