Signcryption method of biological features of a plurality of receivers

A biometric and multi-receiver technology, applied in the computer field, can solve problems such as low decryption efficiency and sender identity confirmation

Inactive Publication Date: 2014-12-17
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to overcome the problems of the above-mentioned prior art that each user needs to securely store the key when performing secure broadcasting, confirm the identity of the sender during decryption, and have low decryption efficiency, and provide a multi-receiver biometric feature combined with fuzzy extraction technology Signcryption method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signcryption method of biological features of a plurality of receivers
  • Signcryption method of biological features of a plurality of receivers
  • Signcryption method of biological features of a plurality of receivers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] Attached below figure 1 The present invention will be further described.

[0065] Step 1. System parameter generation

[0066] According to the security parameter κ, the key generation center selects a large prime number q (q>2 κ ), construct two q-th order additive cyclic group G 1 And multiplicative cyclic group G 2 ; And construct a bilinear map, namely e: G 1 ×G 1 →G 2 ; From group G 1 Randomly select generator P, randomly select system master key And an element P 0 ∈G 1 , Calculate the corresponding system public key P pub =sP; Construct 5 password one-way hash functions, denoted as: H 1 : { 0,1 } i X { 0,1 } * → z q * ; H 2 : { 0,1 } * → Z q * ; H 3 : G 2 →{0, 1} l ; H 4 : {0, 1} l →{0, 1} l ; Key generation center constructs a fuzzy extraction algorithm, including feature extraction function F b , Encoding function E b , Decoding function D b , And select an encryption algorithm (E...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a signcryption method of biological features of a plurality of receivers, comprising generating system parameters; extracting features; performing user log-on; encrypting by a sender; and decrypting by receivers. The method employs fuzzy extractor technique to bind the biological features and user keys to protect keys, directly authenticates user identity through the biological features, solves the safety problems of key safety and key abuse in the conventional cryptography, adds digital signature of senders during encryption, verifies identity of senders through certification during decryption, and solves the problem of counterfeiting of senders. The method improves the safety and reliability of whole systems, has the advantages of high safety, high efficiency and no need for storing any secret information by users, and can be applied to the distributed network application field.

Description

Technical field [0001] The present invention belongs to the field of computer technology, and further relates to a multi-recipient biometric signcryption method in the field of network security technology. The present invention is a multi-recipient biometrics (such as fingerprint, iris, face, etc.) signcryption method, that is, the message sender uses his own biometrics to encrypt the ciphertext obtained, and every authorized receiver can use it Its biological characteristics decrypt the ciphertext. The invention can be used in distributed network applications, and solves the security problem of the network service provider broadcasting messages to all authorized users in the network, the security problem of all authorized users' private keys, and the problem of the receiver confirming the sender's identity. Background technique [0002] In distributed network applications (such as network conferences, round table conferences, pay TV, etc.), in order to ensure that only authoriz...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 庞辽军张鹏曹凯
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products