CN115278673A - Lightweight biometric authentication method and system based on joint biometrics - Google Patents
Lightweight biometric authentication method and system based on joint biometrics Download PDFInfo
- Publication number
- CN115278673A CN115278673A CN202210945193.2A CN202210945193A CN115278673A CN 115278673 A CN115278673 A CN 115278673A CN 202210945193 A CN202210945193 A CN 202210945193A CN 115278673 A CN115278673 A CN 115278673A
- Authority
- CN
- China
- Prior art keywords
- template
- extractor
- user
- vector
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 132
- 239000013598 vector Substances 0.000 claims abstract description 112
- 238000004364 calculation method Methods 0.000 claims abstract description 60
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 23
- 229940088594 vitamin Drugs 0.000 claims abstract 3
- 239000011782 vitamin Substances 0.000 claims abstract 3
- 230000008569 process Effects 0.000 claims description 24
- 239000011159 matrix material Substances 0.000 claims description 13
- 238000006243 chemical reaction Methods 0.000 claims description 11
- 239000000654 additive Substances 0.000 claims description 9
- 230000000996 additive effect Effects 0.000 claims description 9
- 239000000284 extract Substances 0.000 claims description 9
- 230000009466 transformation Effects 0.000 claims description 6
- 238000009825 accumulation Methods 0.000 claims description 3
- 238000000605 extraction Methods 0.000 claims description 3
- 238000004590 computer program Methods 0.000 claims description 2
- 238000012986 modification Methods 0.000 claims description 2
- 230000004048 modification Effects 0.000 claims description 2
- 238000007792 addition Methods 0.000 claims 1
- 238000012512 characterization method Methods 0.000 claims 1
- 230000002596 correlated effect Effects 0.000 claims 1
- 230000000875 corresponding effect Effects 0.000 claims 1
- 238000012217 deletion Methods 0.000 claims 1
- 230000037430 deletion Effects 0.000 claims 1
- 230000001131 transforming effect Effects 0.000 claims 1
- 238000004088 simulation Methods 0.000 description 8
- 238000010276 construction Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000002441 reversible effect Effects 0.000 description 4
- 238000012549 training Methods 0.000 description 4
- 238000013461 design Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000003491 array Methods 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000003786 synthesis reaction Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
技术领域technical field
本发明属于生物特征识别技术领域,尤其涉及一种基于联合生物识别的轻量级生物认证方法及系统。The invention belongs to the technical field of biometric identification, and in particular relates to a lightweight biometric authentication method and system based on joint biometric identification.
背景技术Background technique
近年来,智能移动设备的普及不断提高了人们的生活质量,移动设备的市场规模也在不断扩大,此外,智能手表、平板电脑和其他移动设备也在推动移动市场的扩张。虽然移动设备给人们带来了便利,但它们也对用户的隐私和安全构成了威胁。随着用户将个人敏感信息(如银行账户和图像数据)存储在智能移动设备上,个人隐私的泄漏也成为研究者关注的焦点。In recent years, the popularity of smart mobile devices has continuously improved people's quality of life, and the market size of mobile devices is also expanding. In addition, smart watches, tablet computers and other mobile devices are also driving the expansion of the mobile market. While mobile devices bring convenience to people, they also pose a threat to users' privacy and security. As users store personal sensitive information (such as bank account and image data) on smart mobile devices, the leakage of personal privacy has also become the focus of researchers.
现有的大多数智能移动设备都利用基于知识的身份认证机制来确保自身的安全性和数据隐私(如基于PIN码、基于模式的密码认证)。然而,大多数用户倾向于设置简单而弱的密码以便于记忆。这种基于知识的身份验证易受监听攻击和字典攻击,因此攻击者可以获得访问存储在设备中的个人敏感信息的权限。生物特征技术利用其独特性、通用性、稳定性和可获取性,推动了生物特征认证的不断发展,使生物特征认证更加方便、准确。它还克服了基于知识的身份验证中密码设置的漏洞。Most existing smart mobile devices use knowledge-based identity authentication mechanisms to ensure their own security and data privacy (such as PIN code-based, pattern-based password authentication). However, most users tend to set simple and weak passwords that are easy to remember. This knowledge-based authentication is vulnerable to snooping and dictionary attacks, whereby attackers can gain access to sensitive personal information stored on the device. Using its uniqueness, versatility, stability and availability, biometric technology has promoted the continuous development of biometric authentication, making biometric authentication more convenient and accurate. It also overcomes the vulnerability of password settings in knowledge-based authentication.
通过上述分析,现有技术存在的问题及缺陷为:现有的生物认证方法大多基于单个生物特征,准确性和稳定性不高,并且无法应用于不同的应用背景;此外,现有的生物认证方法的安全性不高,一旦生物特征被盗、损坏或伪造,基于生物特征的身份认证可能会受到人工合成、重播、和欺骗攻击的威胁。Through the above analysis, the problems and defects of the existing technology are: most of the existing biometric authentication methods are based on a single biometric feature, the accuracy and stability are not high, and they cannot be applied to different application backgrounds; in addition, the existing biometric authentication methods The security of the method is not high. Once the biometric feature is stolen, damaged or forged, the identity authentication based on the biometric feature may be threatened by artificial synthesis, replay, and spoofing attacks.
解决以上问题及缺陷的难度为:(1)智能移动设备的计算能力和存储能力是有限的,所以需要设计一种轻量级生物认证方法。(2)现有的生物认证方法大多基于单个生物特征,准确性和稳定性不高,并且无法应用于不同的应用背景,所以设计的方法需要能够将这些生物特征整合起来,实现各种生物特征信息的综合应用。(3)由于生物特征的独特性,一旦生物特征被盗、损坏或伪造,基于生物特征的身份认证可能会受到人工合成、重播、和欺骗攻击的威胁。所以,设计的方法需要能够在生物特征被窃取或损坏后重建用户生物特征模板。The difficulties in solving the above problems and defects are as follows: (1) The computing power and storage capacity of smart mobile devices are limited, so it is necessary to design a lightweight biometric authentication method. (2) Most of the existing biometric authentication methods are based on a single biometric feature, the accuracy and stability are not high, and they cannot be applied to different application backgrounds, so the designed method needs to be able to integrate these biometric features to achieve various biometric features Comprehensive application of information. (3) Due to the uniqueness of biometrics, once the biometrics are stolen, damaged or forged, identity authentication based on biometrics may be threatened by artificial synthesis, replay, and spoofing attacks. Therefore, the designed method needs to be able to reconstruct the user biometric template after the biometric is stolen or damaged.
发明内容Contents of the invention
为了克服上述现有技术的缺点,本发明的目的在于提供了一种基于联合生物识别的轻量级生物认证方法及系统,适应于现阶段智能移动设备的应用环境,结合基于知识的认证和基于多个生物特征的认证可以克服仅使用密码认证的低安全性,应用可取消模板模块可以防止生物模板在被盗或损坏后的不可恢复性,具有高安全性、低开销的优点。In order to overcome the shortcomings of the above-mentioned prior art, the purpose of the present invention is to provide a lightweight biometric authentication method and system based on joint biometrics, which is suitable for the application environment of smart mobile devices at the present stage, and combines knowledge-based authentication and authentication-based The authentication of multiple biometrics can overcome the low security of password authentication only, and the application of the cancelable template module can prevent the irrecoverability of the biometric template after being stolen or damaged, which has the advantages of high security and low overhead.
为了达到上述目的,本发明采取的技术方案为:In order to achieve the above object, the technical scheme that the present invention takes is:
一种基于联合生物识别的轻量级生物认证方法,包括以下步骤:A lightweight biometric authentication method based on joint biometrics, comprising the following steps:
S101:可信中心TA生成一系列密钥,为认证用户Ui生成公钥私钥对称加密密钥和认证密钥为注册用户Ri生成索引构建密钥 S101: The trusted center TA generates a series of keys, and generates a public key for the authenticated user U i private key Symmetric encryption key and authentication key Generate an index build key for registered user R i
S102:提取器通过混淆生物特征模板vB来构造d维生物特征注册向量vR和生物特征模板Ti,并使用同态加密算法Paillier的公钥加密生物特征模板Ti;S102: The extractor constructs a d-dimensional biometric registration vector v R and a biometric template T i by confusing the biometric template v B , and encrypts the biometric template T i using the homomorphic encryption algorithm Paillier's public key;
S103:提取器扩展注册向量到使用注册密钥加密将发送给计算服务器CS,计算服务器CS加密索引I并发送给数据库DB;S103: Extractor extension registration vector arrive use registration key encryption Will Send to the calculation server CS, the calculation server CS encrypts the index I and sends it to the database DB;
S104:提取器扩展特征向量vA到v′A,对扩展的特征向量v′A和生物特征模版TA进行加密,并将和EK(TA)发送给计算服务器CS;S104: The extractor expands the feature vector v A to v′ A , encrypts the extended feature vector v′ A and the biometric template T A , and and E K (T A ) are sent to the computing server CS;
S105:数据库DB对接收到的加密索引I和认证查询QA进行变换,计算每个注册模板和认证查询QA之间的相似性,将候选模板集合发送给计算服务器CS,以便计算服务器CS计算欧几里德距离 S105: The database DB transforms the received encrypted index I and the authentication query Q A , calculates the similarity between each registration template and the authentication query Q A , and sends the set of candidate templates to the calculation server CS, so that the calculation server CS can calculate Euclidean distance
S106:支持三种更新操作:添加、删除和修改,即新用户注册、现有用户撤销和基于可取消模板模块的现有用户密钥和特征模板的更新。S106: Support three update operations: add, delete and modify, ie new user registration, existing user revocation, and update of existing user keys and feature templates based on cancelable template modules.
所述的基于联合生物识别的轻量级生物认证方法包括生成密钥阶段、加密特征阶段、生成索引阶段、生成令牌阶段、认证阶段和特征更新阶段;The described light-weight biometric authentication method based on joint biometric identification includes a key generation phase, an encryption feature phase, an index generation phase, a token generation phase, an authentication phase and a feature update phase;
生成密钥阶段包括:The key generation phase includes:
(1)可信中心TA为认证用户Ui生成两个大素数p、q,并基于同态加密算法Paillier生成公钥其中n=pq,g是小于n2的随机数;私钥其中α=lcm(p-1,q-1),此外,可信中心TA为认证用户Ui基于对称加密算法AES生成对称加密密钥 (1) The trusted center TA generates two large prime numbers p and q for the authenticated user U i , and generates a public key based on the homomorphic encryption algorithm Paillier Where n=pq, g is a random number less than n 2 ; the private key where α = lcm(p-1, q-1), In addition, the trusted center TA generates a symmetric encryption key for the authenticated user U i based on the symmetric encryption algorithm AES
(2)首先,可信中心TA为认证用户Ui生成一个随机可逆矩阵及其逆矩阵M,M-1∈Z2d ×2d,其中d是特征向量的维数;然后,对于每个认证用户Ui,可信中心TA生成两个随机矩阵作为认证密钥,其中最后,对于每个注册用户Ri,可信中心TA生成两个随机矩阵作为索引构建密钥,其中 (2) First, the trusted center TA generates a random reversible matrix and its inverse matrix M for the authenticated user U i , M -1 ∈ Z 2d ×2d , where d is the dimension of the feature vector; then, for each authenticated user U i , the trusted center TA generates two random matrices As an authentication key, where Finally, for each registered user R i , the trusted center TA generates two random matrices As an index build key, where
加密特征阶段包括:The encryption feature phase includes:
(1)通过人脸和指纹特征提取,获得N个M维向量和一个n维向量vf;定义操作计算公式如下:(1) Obtain N M-dimensional vectors through face and fingerprint feature extraction and an n-dimensional vector v f ; define the operation Calculated as follows:
获得的混淆生物特征模板如下:The obfuscated biometric template obtained is as follows:
(2)提取器首先在vB的每个向量中随机选择m1(m1∈M)个数字,获取每个向量中相关下标的数据来构造特征候选向量v″i(i=1,…,N),随机生成的下标定义为用户的注册密钥提取器基于“字符串连接”操作连接特征候选向量来构建d维生物特征注册向量,计算公式如下:(2) The extractor first randomly selects m 1 (m 1 ∈ M) numbers in each vector of v B , obtains the relevant subscript data in each vector to construct the feature candidate vector v″ i (i=1,… , N), the randomly generated subscript is defined as the user's registration key The extractor constructs a d-dimensional biometric registration vector by concatenating feature candidate vectors based on the "string concatenation" operation, and the calculation formula is as follows:
vR=v″1||v″2||…||v″N v R =v″ 1 ||v″ 2 ||…||v″ N
(3)提取器在vB的每个向量中随机选择m2(m2∈M)个数字,随机生成的下标定义为用户的模板密钥获取每个向量中相关下标的数据来构造生物特征模板Ti,计算公式如下:(3) The extractor randomly selects m 2 (m 2 ∈ M) numbers in each vector of v B , and the randomly generated subscript is defined as the template key of the user Obtain the relevant subscript data in each vector to construct the biometric template T i , the calculation formula is as follows:
(4)提取器使用同态加密算法Paillier的公钥加密生物特征模板Ti,加密公式如下:(4) The extractor uses the homomorphic encryption algorithm Paillier's public key to encrypt the biometric template T i , and the encryption formula is as follows:
生成索引阶段包括:The build index phase includes:
(1)首先,提取器扩展每个注册向量到扩展公式如下:(1) First, the extractor expands each registration vector arrive The expansion formula is as follows:
其中是提取器为每个注册向量随机选择的数字;in is the extractor for each registration vector randomly selected numbers;
(2)然后,提取器使用注册密钥加密加密公式如下:(2) Then, the extractor uses the registration key encryption The encryption formula is as follows:
其中,p1>>p2并且γ>>2|max(εi)|,定义为从概率分布中随机选择的整数混淆向量;是由注册向量组成的密文;提取器以元组的形式将和从注册用户Ri传输给计算服务器CS;当计算服务器CS收到所有注册用户的加密元祖时,将创建加密索引其中Umax表示数据库DB中的用户总数;加密索引I将由计算服务器CS传输到数据库DB中进行存储。in, p 1 >>p 2 and γ>>2|max(ε i )|, Defined as an integer confusion vector randomly selected from the probability distribution; is given by the registration vector The composed ciphertext; the extractor takes the tuple in the form of and Transmitted from registered user R i to computing server CS; when computing server CS receives encrypted tuples of all registered users, an encrypted index will be created Where U max represents the total number of users in the database DB; the encrypted index I will be transmitted by the computing server CS to the database DB for storage.
生成令牌阶段包括:The token generation phase includes:
(1)首先,提取器从认证用户Uj的生物特征中提取特征向量vA和具有注册密钥和模板密钥的生物特征模板TA;(1) First, the extractor extracts the feature vector v A from the biometric feature of the authenticated user U j and has the registration key and the template key biometric template T A ;
(2)然后,提取器扩展特征向量vA到v′A,扩展公式如下:(2) Then, the extractor expands the feature vector v A to v′ A , and the expansion formula is as follows:
其中是提取器为认证用户Uj的认证查询随机选择的数字,需要注意ηj是正数;in is the number randomly selected by the extractor for the authentication query of the authenticated user U j , it should be noted that η j is a positive number;
(3)接着,提取器使用认证用户Uj的认证密钥对扩展向量v′A进行加密,加密公式如下:(3) Next, the extractor uses the authentication key of the authenticated user U j Encrypt the extended vector v′ A , the encryption formula is as follows:
其中是由提取器随机选择的整数混淆向量;提取器将加密的认证查询QA发送给计算服务器CS,然后再将认证查询QA发送给数据库DB进行认证;in is an integer confusion vector randomly selected by the extractor; the extractor sends the encrypted authentication query Q A to the computing server CS, and then sends the authentication query Q A to the database DB for authentication;
(4)提取器使用认证用户Uj的同态加密算法Paillier的公钥对生物特征模版TA进行加密以获得密文除此之外,提取器使用认证用户Uj的对称密钥对生物特征模版TA进行加密以获得密文EK(TA);提取器将和EK(TA)发送给计算服务器CS,用于后续密文的欧几里德距离计算。(4) The extractor uses the public key of the homomorphic encryption algorithm Paillier of the authenticated user U j Encrypt the biometric template T A to obtain the ciphertext Among other things, the extractor authenticates the user U j using the symmetric key Encrypt the biometric template T A to obtain the ciphertext E K (T A ); the extractor will and E K (T A ) are sent to the computing server CS for Euclidean distance calculation of subsequent ciphertexts.
认证阶段包括:The certification phase includes:
认证过程包括三个步骤:首先,数据库DB对接收到的加密索引I和认证查询QA进行变换;然后,数据库DB根据其存储的加密索引汁算每个注册模板和认证查询QA之间的相似性;最后,数据库DB将候选模板集合发送给计算服务器CS,以便计算服务器CS使用与候选集和密文相关的特征模板去计算两者之间的欧几里德距离;具体过程如下:The authentication process includes three steps: first, the database DB transforms the received encrypted index I and the authentication query Q A ; then, the database DB transforms the received encrypted index I according to its stored encrypted index Calculate the similarity between each registration template and the authentication query Q A ; finally, the database DB sends the set of candidate templates to the computing server CS, so that the computing server CS uses the candidate set and the ciphertext Related feature templates to calculate the Euclidean distance between the two; the specific process is as follows:
(1)数据库DB对从提取器接收到的加密索引中的每一个进行变换;然后,数据库DB再对从提取器接收到的认证查询QA进行变换,变换公式如下:(1) The database DB pairs the encrypted index received from the extractor each of Transformation; then, the database DB transforms the authentication query Q A received from the extractor, and the transformation formula is as follows:
(2)数据库DB计算变换后的查询和在索引I中的每一个加密项的相关性分数,计算公式如下:(2) Database DB calculates the transformed query and every encrypted item in index I The correlation score of is calculated as follows:
其中是相似性分数的随机数部分,消除和这两部分以获得上式的计算结果;in is the random number part of the similarity score, eliminating and These two parts are used to obtain the calculation result of the above formula;
根据计算结果,数据库DB获得最接近的k个索引条目,将其相应的生物特征模板集合发送给计算服务器CS,计算服务器CS将计算密文模板和k个候选模板之间的欧几里德距离;According to the calculation result, the database DB obtains the closest k index entries, and sends its corresponding biometric template set to the calculation server CS, and the calculation server CS will calculate the ciphertext template and the Euclidean distance between k candidate templates;
(3)计算服务器CS使用认证用户Ui的对称密钥对密文EK(TA)进行解密,以获取生物特征模版然后,计算和候选模板之间的欧几里德距离,计算公式如下:(3) The computing server CS uses the symmetric key of the authenticated user U i Decrypt the ciphertext E K (T A ) to obtain the biometric template Then, calculate and candidate templates The Euclidean distance between is calculated as follows:
如果上式中的欧几里德距离是在同态加密算法Paillier下根据其加法同态计算的,那么计算结果如下:If the Euclidean distance in the above formula is calculated according to its additive homomorphism under the homomorphic encryption algorithm Paillier, then the calculation result is as follows:
对于和这两部分,利用加法同态将其转换为下面的式子,转换公式如下:for and These two parts are converted into the following formula by using additive homomorphism, and the conversion formula is as follows:
对于这部分,利用加法同态将其转换为下面的式子,转换公式如下:for In this part, use additive homomorphism to convert it into the following formula, and the conversion formula is as follows:
计算服务器CS将进行转换,转换公式如下:Compute Server CS will To convert, the conversion formula is as follows:
在计算服务器CS具有明文、密文模板TA,和加密的候选模板集合的前提下,计算服务器CS检查密文模板和每个候选模板的欧几里德距离,结果中的最小欧几里德距离是否满足设置的阈值T;如果小于设置的阈值T,计算服务器CS认为认证通过;否则,计算服务器CS认为认证失败。There is plaintext and ciphertext template T A in computing server CS, and the encrypted candidate template set, the computing server CS checks the ciphertext template The Euclidean distance to each candidate template, the minimum Euclidean distance in the result Whether it satisfies the set threshold T; if it is less than the set threshold T, the computing server CS considers the authentication passed; otherwise, the computing server CS considers the authentication failed.
特征更新阶段包括:The feature update phase includes:
系统支持三种更新操作:添加、删除和修改,即新用户注册、现有用户撤销和基于可取消模板模块的现有用户密钥和特征模板的更新,具体过程如下:The system supports three update operations: add, delete, and modify, namely new user registration, existing user revocation, and update of existing user keys and feature templates based on cancelable template modules. The specific process is as follows:
(1)新用户UADD通过提取器上传自己的生物特征数据,提取器对生物特征数据进行处理,分别生成加密的注册向量和加密的特征模板提取器将发送到计算服务器CS,计算服务器CS将其发送到数据库DB,数据库DB将添加到存储的索引中以完成新用户的注册;(1) The new user U ADD uploads his biometric data through the extractor, and the extractor processes the biometric data to generate encrypted registration vectors respectively and the encrypted feature template The extractor will to the calculation server CS, the calculation server CS sends it to the database DB, and the database DB will added to the stored index to complete the registration of a new user;
(2)现有用户撤销过程需要三个操作;首先,提取器收集并提取待撤销用户UDEL的生物特征;此外,提取器利用注册密钥生成匹配索引条目然后,提取器将索引条目发送给计算服务器CS,计算服务器CS将其发送到数据库DB;最后,数据库DB在其存储的索引上删除索引条目和匹配的加密模板 (2) The existing user revocation process requires three operations; first, the extractor collects and extracts the biometrics of the user U DEL to be revoked; in addition, the extractor utilizes the registration key generate matching index entries The extractor will then index the entry Sent to Compute Server CS, Compute Server CS sends it to Database DB; Finally, Database DB deletes the index entry on the index it stores and the matching encryption template
(3)当用户Ui的生物模板损坏或被盗时,用户Ui基于可取消模板模块重新输入生物特征;首先,提取器提取用户生物特征并获得注册索引项和加密模板此外,提取器生成新的注册和模板密钥和然后,提取器将和发送给计算服务器CS,计算服务器CS将其发送到数据库DB;最后,数据库DB利用索引项去匹配加密索引I中与用户Ui相关的索引项删除索引项和相关的加密模板并将和插入到加密索引I中,(3) When the biological template of user U i is damaged or stolen, user U i re-enters the biometric feature based on the cancelable template module; first, the extractor extracts the user biometric feature and obtains the registration index item and encrypted template Additionally, the extractor generates new registration and template keys and Then, the extractor will and Sent to the computing server CS, the computing server CS sends it to the database DB; finally, the database DB utilizes the index item To match the index items related to user U i in encrypted index I delete index entry and associated encryption templates and will and Inserted into encrypted index I,
其中,TA:可信中心;CS:计算服务器;DB:数据库;Ui、Uj:认证用户;认证用户Ui的公钥;认证用户Ui的私钥;认证用户Ui的对称加密密钥;认证密钥;Ri:注册用户;索引构建密钥;vB:生物特征模板;vR:生物特征注册向量;Ti:候选模板;Paillier:一种同态加密算法;注册向量;扩展后的注册向量;I:加密索引;vA:特征向量;v′A:扩展后的特征向量;TA:生物特征模版;QA:认证查询;欧几里德距离;AES:一种对称加密算法;M:随机可逆矩阵;M-1:M的逆矩阵;m1、m2:随机数;v″i:特征候选向量;注册用户Ri的注册密钥;模板密钥;生物特征模板Ti的加密形式;注册向量的加密形式;Umax:数据库DB中的用户总数;生物特征模版TA的同态加密形式;EK(TA):生物特征模版TA的对称加密形式;认证用户Uj的对称密钥;变换后的查询;UADD:新用户;新用户UADD加密的注册向量;新用户UADD加密的特征模板;UDEL:待撤销用户;待撤销用户UDEL的注册密钥;与待撤销用户UDEL匹配的索引条目;与待撤销用户UDEL匹配的加密模板;用户Ui新的注册索引项;用户Ui新的加密模板;用户Ui新的注册密钥;用户Ui新的模板密钥;新定义的向量运算;||:字符串连接操作;∑:累加运算;Π:连乘运算。Among them, TA: trusted center; CS: computing server; DB: database; U i , U j : authenticated users; Authenticating the public key of user U i ; Authenticating the private key of user U i ; symmetric encryption key for authenticating user U i ; Authentication key; R i : registered user; Index construction key; v B : biometric template; v R : biometric registration vector; T i : candidate template; Paillier: a homomorphic encryption algorithm; registration vector; Extended registration vector; I: encrypted index; v A : feature vector; v′ A : extended feature vector; T A : biometric template; Q A : authentication query; Euclidean distance; AES: a symmetric encryption algorithm; M: random reversible matrix; M -1 : the inverse matrix of M; m 1 , m 2 : random numbers; v″ i : feature candidate vector; Registration key of registered user R i ; template key; An encrypted form of the biometric template T i ; registration vector encrypted form; U max : the total number of users in the database DB; The homomorphic encryption form of the biometric template T A ; E K (T A ): the symmetric encryption form of the biometric template T A ; symmetric key for authenticating user U j ; Transformed query; U ADD : new user; New user U ADD encrypted registration vector; Feature template encrypted by new user U ADD ; U DEL : user to be revoked; The registration key of the user U DEL to be revoked; Index entries matching the user U DEL to be revoked; The encryption template matching the user U DEL to be revoked; User U i 's new registration index item; User U i 's new encryption template; User U i new registration key; User U i new template key; Newly defined vector operations; ||: string concatenation operation; ∑: accumulation operation; Π: multiplication operation.
基于联合生物识别的轻量级生物认证方法通过一种接收用户输入程序存储介质存储,通过计算机程序使电子设备执行。The lightweight biometric authentication method based on combined biometrics is stored in a program storage medium that receives user input, and is executed by electronic equipment through a computer program.
基于联合生物识别的轻量级生物认证方法采用轻量级生物认证系统实现,轻量级生物认证系统包括:The lightweight biometric authentication method based on joint biometrics is implemented using a lightweight biometric authentication system, which includes:
提取器,用于提取生物特征,生成可取消模板模块,加密模板;An extractor for extracting biometrics, generating cancelable template modules, and encrypting templates;
可信中心,用于生成密钥;a trusted center for generating keys;
计算服务器,用于加密生物特征的欧几里德距离计算;Calculation server for Euclidean distance calculation of encrypted biometric features;
数据库,用于对索引进行存储。Database for storing indexes.
所述的轻量级生物认证系统搭载于终端,终端为物联网终端。The lightweight biometric authentication system is carried on a terminal, and the terminal is an Internet of Things terminal.
本发明的有益效果为:本发明使用新提出的随机位生成RBG和加密过程来构造生物特征模板和相关索引,可以保护外包存储的生物特征模板的隐私和身份认证过程的机密性;在提取器提取认证模板后,利用随机位生成RBG和矩阵密钥对模板进行混淆和加密以获得令牌,可以确保整个认证过程的安全性和查询的不可连接性;认证匹配过程,筛选出靠近令牌的匹配集,然后逐个比较认证模板和匹配集中模板之间的相似性,基于新提出的加密向量距离计算方法执行相似性计算,这样认证过程具有很强的鲁棒性,可以确保认证的准确性;所以本发明的方法以更小的成本达到更高的安全性和准确性。The beneficial effects of the present invention are: the present invention uses the newly proposed random bit to generate RBG and encryption process to construct biometric templates and related indexes, which can protect the privacy of outsourced stored biometric templates and the confidentiality of the identity authentication process; After extracting the authentication template, use random bits to generate RBG and matrix keys to confuse and encrypt the template to obtain a token, which can ensure the security of the entire authentication process and the incompatibility of the query; the authentication matching process screens out the tokens that are close to the token Matching set, and then compare the similarity between the authentication template and the template in the matching set one by one, and perform similarity calculation based on the newly proposed encrypted vector distance calculation method, so that the authentication process is very robust and can ensure the accuracy of authentication; Therefore, the method of the present invention achieves higher safety and accuracy at a lower cost.
本发明采用基于低开销的加密过程和随机位生成来构造生物特征模板和相关索引,用户将从随机位生成获取密钥作为身份认证密码,这是后续实现联合知识和生物特征身份认证的基础;在提取器提取认证模板后,利用随机位生成和矩阵密钥对模板进行混淆和加密以获得令牌,使用可搜索加密技术设计了一种基于令牌和加密索引的检索方法,检索k个最接近认证模板的模板索引,可以确保整个认证过程的安全性和查询的不可连接性;本发明提出了一种结合人脸和指纹的生物特征模板构建方法,该方法使用局部二值特征LBP和基于细节的指纹特征,认证过程中筛选出靠近令牌的匹配集,然后逐个比较认证模板和匹配集中模板之间的相似性,基于新提出的加密向量距离计算方法执行相似性计算,这样认证过程具有很强的鲁棒性,可以确保认证的准确性。本发明满足生物特征识别中模板的机密性、可更新性、可撤销性、不可逆性和不可连接性,实现了生物特征低成本和识别高安全性需求之间的均衡。The present invention adopts low-overhead-based encryption process and random bit generation to construct biometric templates and related indexes, and users will generate and obtain keys from random bits as identity authentication passwords, which is the basis for subsequent realization of joint knowledge and biometric identity authentication; After the extractor extracts the authentication template, it uses random bit generation and matrix key to confuse and encrypt the template to obtain tokens, and uses searchable encryption technology to design a retrieval method based on tokens and encrypted indexes to retrieve the k most The template index close to the authentication template can ensure the security of the entire authentication process and the non-connectability of the query; the present invention proposes a biometric template construction method combining face and fingerprint, which uses local binary features LBP and based on The fingerprint characteristics of the details, the matching set close to the token is screened out during the authentication process, and then the similarity between the authentication template and the template in the matching set is compared one by one, and the similarity calculation is performed based on the newly proposed encryption vector distance calculation method, so that the authentication process has Strong robustness can ensure the accuracy of authentication. The invention satisfies the confidentiality, renewability, revocability, irreversibility and non-connectability of templates in biological feature identification, and realizes the balance between low cost of biological features and high identification security requirements.
本发明与经典的生物认证方法进行对比分析。安全性对比结果如表1所示,其中“√”表示满足该项安全需求,“×”表示不满足该项安全需求,“*”表示部分满足该项安全需求。The present invention is compared and analyzed with the classical biometric authentication method. The security comparison results are shown in Table 1, where "√" indicates that the security requirement is met, "×" indicates that the security requirement is not met, and "*" indicates that the security requirement is partially met.
表1安全性对比Table 1 Security comparison
在表1中,本发明方法具有其他经典的生物认证方法没有的可更新性和可撤销性;Zhu等人的方法具有可验证性和抗共谋性,但由于在方法中引入了双线性配对,这不可避免地会产生较高的系统开销,使得该方法不适用于移动设备。本发明方法实现了生物认证低成本和高安全性需求之间的均衡。In Table 1, the method of the present invention has renewability and revocability that other classical biometric authentication methods do not have; the method of Zhu et al. has verifiability and collusion resistance, but due to the introduction of bilinear pairing, which inevitably produces high system overhead, making this method unsuitable for mobile devices. The method of the invention realizes the balance between low cost of biometric authentication and high security requirements.
附图说明Description of drawings
图1是本发明实施例轻量级生物认证方法流程图。Fig. 1 is a flowchart of a lightweight biometric authentication method according to an embodiment of the present invention.
图2是本发明实施例轻量级生物认证系统的系统框架图。Fig. 2 is a system frame diagram of a lightweight biometric authentication system according to an embodiment of the present invention.
图3是本发明实施例轻量级生物认证方法的实现流程图。Fig. 3 is a flow chart of implementing a lightweight biometric authentication method according to an embodiment of the present invention.
图4、图5和图6是本发明实施例轻量级生物认证方法与其他经典的生物认证方法在不同数据库(ORL、Yale和FERET数据库)中的认证准确率和认证时间对比图。Fig. 4, Fig. 5 and Fig. 6 are comparison charts of authentication accuracy and authentication time in different databases (ORL, Yale and FERET databases) between the lightweight biometric authentication method of the embodiment of the present invention and other classic biometric authentication methods.
图7、图8和图9是本发明实施例轻量级生物认证方法中LBP特征描述子的维度在不同数据库(ORL、Yale和FERET数据库)下对不同数据量的认证准确率的仿真图。Fig. 7, Fig. 8 and Fig. 9 are the simulation diagrams of the authentication accuracy of the LBP feature descriptor dimension in different databases (ORL, Yale and FERET databases) for different data volumes in the lightweight biometric authentication method of the embodiment of the present invention.
图10是本发明实施例轻量级生物认证方法与其他经典的生物认证方法在不同特征向量大小下生成密钥和生成令牌的时间开销对比图。Fig. 10 is a comparison diagram of the time cost of key generation and token generation in the light-weight biometric authentication method of the embodiment of the present invention and other classic biometric authentication methods under different feature vector sizes.
图11是本发明实施例轻量级生物认证方法与其他经典的生物认证方法在FERET数据库中索引构建的时间开销对比图。Fig. 11 is a comparison diagram of the time cost of index construction in the FERET database between the lightweight biometric authentication method and other classic biometric authentication methods according to the embodiment of the present invention.
图12是本发明实施例轻量级生物认证方法与其他经典的生物认证方法在FERET数据库中查询的时间开销对比图。Fig. 12 is a comparison diagram of the time cost of querying in the FERET database between the lightweight biometric authentication method and other classic biometric authentication methods according to the embodiment of the present invention.
图13、图14和图15是本发明实施例轻量级生物认证方法与其他经典的生物认证方法在不同向量大小和数据量下加密向量计算的时间开销对比图。Fig. 13, Fig. 14 and Fig. 15 are comparison diagrams of the time cost of encryption vector calculation between the lightweight biometric authentication method of the embodiment of the present invention and other classic biometric authentication methods under different vector sizes and data volumes.
具体实施方式Detailed ways
以下结合实施例和附图对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。The present invention will be described in further detail below in conjunction with the embodiments and accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
如图1所示,一种基于联合生物识别的轻量级生物认证方法,包括以下步骤:As shown in Figure 1, a lightweight biometric authentication method based on joint biometrics includes the following steps:
S101:可信中心TA生成一系列密钥,为认证用户Ui生成公钥私钥对称加密密钥和认证密钥为注册用户Ri生成索引构建密钥 S101: The trusted center TA generates a series of keys, and generates a public key for the authenticated user U i private key Symmetric encryption key and authentication key Generate an index build key for registered user R i
S102:提取器通过混淆生物特征模板vB来构造d维生物特征注册向量vR和生物特征模板Ti,并使用同态加密算法Paillier的公钥加密生物特征模板Ti;S102: The extractor constructs a d-dimensional biometric registration vector v R and a biometric template T i by confusing the biometric template v B , and encrypts the biometric template T i using the homomorphic encryption algorithm Paillier's public key;
S103:提取器扩展注册向量到使用注册密钥加密将发送给计算服务器CS,计算服务器CS加密索引I并发送给数据库DB;S103: Extractor extension registration vector arrive use registration key encryption Will Send to the calculation server CS, the calculation server CS encrypts the index I and sends it to the database DB;
S104:提取器扩展特征向量vA到v′A,对扩展的特征向量v′A和生物特征模版TA进行加密,并将和EK(TA)发送给计算服务器CS;S104: The extractor expands the feature vector v A to v′ A , encrypts the extended feature vector v′ A and the biometric template T A , and and E K (T A ) are sent to the computing server CS;
S105:数据库DB对接收到的加密索引I和认证查询QA进行变换,计算每个注册模板和认证查询QA之间的相似性,将候选模板集合发送给计算服务器CS,以便计算服务器CS计算欧几里德距离 S105: The database DB transforms the received encrypted index I and the authentication query Q A , calculates the similarity between each registration template and the authentication query Q A , and sends the set of candidate templates to the calculation server CS, so that the calculation server CS can calculate Euclidean distance
S106:支持三种更新操作:添加、删除和修改,即新用户注册、现有用户撤销和基于可取消模板模块的现有用户密钥和特征模板的更新。S106: Support three update operations: add, delete and modify, ie new user registration, existing user revocation, and update of existing user keys and feature templates based on cancelable template modules.
如图2所示,所述基于联合生物识别的轻量级生物认证方法采用轻量级生物认证系统实现,轻量级生物认证系统包括:As shown in Figure 2, the lightweight biometric authentication method based on joint biometrics is implemented using a lightweight biometric authentication system, and the lightweight biometric authentication system includes:
提取器:作为系统中完全受信任的实体,提取器具有足够的计算能力,但没有大的存储空间,它主要负责提取生物特征,和可信中心一起生成多模式可取消模板,并根据可信中心分配的密钥加密模板;Extractor: As a fully trusted entity in the system, the extractor has sufficient computing power but does not have a large storage space. It is mainly responsible for extracting biometric features, generating multi-mode cancelable templates together with the trusted center, and according to the trusted Key encryption template assigned by the center;
可信中心:负责协助提取器生成多模式可取消模板,并为不同的用户生成不同的模板加密密钥;Trusted center: responsible for assisting the extractor in generating multi-mode cancelable templates, and generating different template encryption keys for different users;
计算服务器:系统中有多个可信的计算服务器,每个计算服务器使用强大的计算能力为系统子区域中的所有用户提供服务,计算服务器负责加密生物特征的欧几里德距离计算,并根据候选模板集和认证模板之间的计算结果返回最终认证结果;Computing server: There are multiple trusted computing servers in the system. Each computing server uses powerful computing power to provide services for all users in the system sub-area. The computing server is responsible for the Euclidean distance calculation of encrypted biometrics, and according to The calculation result between the candidate template set and the authentication template returns the final authentication result;
数据库:作为系统中具有最强计算能力和存储空间的实体,分布式数据库可以存储多个用户的生物特征模板,并通过建立加密的查询索引来关联用户身份和特征模板;数据库是一个半可信实体,将全面执行指令并对存储信息进行统计分析。Database: As the entity with the strongest computing power and storage space in the system, the distributed database can store the biometric templates of multiple users, and associate user identities and feature templates by establishing encrypted query indexes; the database is a semi-trusted Entities that will fully execute instructions and perform statistical analysis on stored information.
如图3所示,所述的基于联合生物识别的轻量级生物认证方法包括生成密钥阶段、加密特征阶段、生成索引阶段、生成令牌阶段、认证阶段和特征更新阶段;As shown in Figure 3, the described lightweight biometric authentication method based on joint biometrics includes a key generation phase, an encryption feature phase, an index generation phase, a token generation phase, an authentication phase and a feature update phase;
生成密钥阶段包括:The key generation phase includes:
(1)可信中心TA为用户Ui生成两个大素数p、q,并基于同态加密算法Paillier生成公钥其中n=pq,g是小于n2的随机数;私钥其中α=lcm(p-1,q-1),此外,可信中心TA为认证用户Ui基于对称加密算法AES生成对称加密密钥 (1) The trusted center TA generates two large prime numbers p and q for the user U i , and generates a public key based on the homomorphic encryption algorithm Paillier Where n=pq, g is a random number less than n 2 ; the private key where α = lcm(p-1, q-1), In addition, the trusted center TA generates a symmetric encryption key for the authenticated user U i based on the symmetric encryption algorithm AES
(2)首先,可信中心TA为认证用户Ui生成一个随机可逆矩阵及其逆矩阵M,M-1∈Z2d ×2d,其中d是特征向量的维数;然后,对于每个认证用户Ui,可信中心TA生成两个随机矩阵作为认证密钥,其中最后,对于每个注册用户Ri,可信中心TA生成两个随机矩阵作为索引构建密钥,其中 (2) First, the trusted center TA generates a random reversible matrix and its inverse matrix M for the authenticated user U i , M -1 ∈ Z 2d ×2d , where d is the dimension of the feature vector; then, for each authenticated user U i , the trusted center TA generates two random matrices As an authentication key, where Finally, for each registered user R i , the trusted center TA generates two random matrices As an index build key, where
加密特征阶段包括:The encryption feature phase includes:
(1)通过人脸和指纹特征提取,可以获得N个M维向量和一个n维向量vf;定义操作计算公式如下:(1) Through face and fingerprint feature extraction, N M-dimensional vectors can be obtained and an n-dimensional vector v f ; define the operation Calculated as follows:
获得的混淆生物特征模板如下:The obfuscated biometric template obtained is as follows:
(2)提取器首先在vB的每个向量中随机选择m1(m1∈M)个数字,获取每个向量中相关下标的数据来构造特征候选向量v″i(i=1,…,N),随机生成的下标定义为用户的注册密钥提取器基于“字符串连接”操作连接特征候选向量来构建d维生物特征注册向量,计算公式如下:(2) The extractor first randomly selects m 1 (m 1 ∈ M) numbers in each vector of v B , obtains the relevant subscript data in each vector to construct the feature candidate vector v″ i (i=1,… , N), the randomly generated subscript is defined as the user's registration key The extractor constructs a d-dimensional biometric registration vector by concatenating feature candidate vectors based on the "string concatenation" operation, and the calculation formula is as follows:
vR=v″1||v″2||…||v″N v R =v″ 1 ||v″ 2 ||…||v″ N
(3)提取器在vB的每个向量中随机选择m2(m2∈M)个数字,随机生成的下标定义为用户的模板密钥获取每个向量中相关下标的数据来构造生物特征模板Ti,计算公式如下:(3) The extractor randomly selects m 2 (m 2 ∈ M) numbers in each vector of v B , and the randomly generated subscript is defined as the template key of the user Obtain the relevant subscript data in each vector to construct the biometric template T i , the calculation formula is as follows:
(4)提取器使用同态加密算法Paillier的公钥加密生物特征模板Ti,加密公式如下:(4) The extractor uses the homomorphic encryption algorithm Paillier's public key to encrypt the biometric template T i , and the encryption formula is as follows:
生成索引阶段包括:The build index phase includes:
(1)首先,提取器扩展每个注册向量到扩展公式如下:(1) First, the extractor expands each registration vector arrive The expansion formula is as follows:
其中是提取器为每个注册向量随机选择的数字;in is the extractor for each registration vector randomly selected numbers;
(2)然后,提取器使用注册密钥加密加密公式如下:(2) Then, the extractor uses the registration key encryption The encryption formula is as follows:
其中,p1>>p2并且γ>>2|max(εi)|,定义为从概率分布中随机选择的整数混淆向量;在随后的认证阶段中,上述参数将用于向量相似性计算;是由注册向量组成的密文;提取器以元组的形式将和从注册用户Ri传输给计算服务器CS;当计算服务器CS收到所有注册用户的加密元祖时,将创建加密索引其中Umax表示数据库DB中的用户总数;加密索引I将由计算服务器CS传输到数据库DB中进行存储。in, p 1 >>p 2 and γ>>2|max(ε i )|, Defined as an integer confusion vector randomly selected from a probability distribution; in the subsequent authentication phase, the above parameters will be used for vector similarity calculations; is given by the registration vector The composed ciphertext; the extractor takes the tuple in the form of and Transmitted from registered user R i to computing server CS; when computing server CS receives encrypted tuples of all registered users, an encrypted index will be created Where U max represents the total number of users in the database DB; the encrypted index I will be transmitted by the computing server CS to the database DB for storage.
生成令牌阶段包括:The token generation phase includes:
(1)首先,提取器从认证用户Uj的生物特征中提取特征向量vA和具有注册密钥和模板密钥的生物特征模板TA;(1) First, the extractor extracts the feature vector v A from the biometric feature of the authenticated user U j and has the registration key and the template key biometric template T A ;
(2)然后,提取器扩展特征向量vA到v′A,扩展公式如下:(2) Then, the extractor expands the feature vector v A to v′ A , and the expansion formula is as follows:
其中是提取器为认证用户Uj的认证查询随机选择的数字,需要注意ηj是正数;in is the number randomly selected by the extractor for the authentication query of the authenticated user U j , it should be noted that η j is a positive number;
(3)接着,提取器使用认证用户Uj的认证密钥对扩展向量v′A进行加密,加密公式如下:(3) Next, the extractor uses the authentication key of the authenticated user U j Encrypt the extended vector v′ A , the encryption formula is as follows:
其中是由提取器随机选择的整数混淆向量;提取器将加密的认证查询QA发送给计算服务器CS,然后再将认证查询QA发送给数据库DB进行认证;in is an integer confusion vector randomly selected by the extractor; the extractor sends the encrypted authentication query Q A to the computing server CS, and then sends the authentication query Q A to the database DB for authentication;
(4)提取器使用认证用户Uj的同态加密算法Paillier的公钥对生物特征模版TA进行加密以获得密文除此之外,提取器使用认证用户Uj的对称密钥对生物特征模版TA进行加密以获得密文EK(TA);提取器将和EK(TA)发送给计算服务器CS,用于后续密文的欧几里德距离计算。(4) The extractor uses the public key of the homomorphic encryption algorithm Paillier of the authenticated user U j Encrypt the biometric template T A to obtain the ciphertext Among other things, the extractor authenticates the user U j using the symmetric key Encrypt the biometric template T A to obtain the ciphertext E K (T A ); the extractor will and E K (T A ) are sent to the computing server CS for Euclidean distance calculation of subsequent ciphertexts.
认证阶段包括:The certification phase includes:
认证过程包括三个步骤:首先,数据库DB对接收到的索引I和认证查询QA进行变换;然后,数据库DB根据其存储的加密索引计算每个注册模板和认证查询QA之间的相似性;最后,数据库DB将候选模板集合发送给计算服务器CS,以便计算服务器CS使用与候选集和密文相关的特征模板去计算两者之间的欧几里德距离;具体过程如下:The authentication process includes three steps: first, the database DB transforms the received index I and the authentication query Q A ; then, the database DB transforms the received index I according to the encrypted index Calculate the similarity between each registration template and the authentication query Q A ; finally, the database DB sends the set of candidate templates to the calculation server CS, so that the calculation server CS uses the candidate set and the ciphertext Related feature templates to calculate the Euclidean distance between the two; the specific process is as follows:
(1)数据库DB对从提取器接收到的加密索引中的每一个进行变换;然后,数据库DB再对从提取器接收到的认证查询QA进行变换,变换公式如下:(1) The database DB pairs the encrypted index received from the extractor each of Transformation; then, the database DB transforms the authentication query Q A received from the extractor, and the transformation formula is as follows:
(2)数据库DB计算变换后的查询和在加密索引I中的每一个加密项的相关性分数,计算公式如下:(2) Database DB calculates the transformed query and each encrypted item in the encrypted index I The correlation score of is calculated as follows:
其中是相似性分数的随机数部分,需要注意的是由于p1>>p2且所以和这两部分的值无限趋近于0;由于计算结果在域上四舍五入,因此可以消除和这两部分以获得上式的计算结果;in is the random number part of the similarity score, it should be noted that since p 1 >>p 2 and so and The values of these two parts are infinitely close to 0; since the calculation results are in the domain is rounded up, so it can be eliminated and These two parts are used to obtain the calculation result of the above formula;
根据计算结果,数据库DB获得最接近的k个索引条目,将其相应的生物特征模板集合发送给计算服务器CS,计算服务器CS将计算密文模板和k个候选模板之间的欧几里德距离;According to the calculation result, the database DB obtains the closest k index entries, and sends its corresponding biometric template set to the calculation server CS, and the calculation server CS will calculate the ciphertext template and the Euclidean distance between k candidate templates;
(3)计算服务器CS使用认证用户Ui的对称密钥对密文EK(TA)进行解密,以获取生物特征模版然后,计算和候选模板之间的欧几里德距离,计算公式如下:(3) The computing server CS uses the symmetric key of the authenticated user U i Decrypt the ciphertext E K (T A ) to obtain the biometric template Then, calculate and candidate templates The Euclidean distance between is calculated as follows:
如果上式中的欧几里德距离是在同态加密算法Paillier下根据其加法同态计算的,那么计算结果如下:If the Euclidean distance in the above formula is calculated according to its additive homomorphism under the homomorphic encryption algorithm Paillier, then the calculation result is as follows:
对于和这两部分,可以利用加法同态将其转换为下面的式子,转换公式如下:for and These two parts can be converted into the following formula by using additive homomorphism. The conversion formula is as follows:
对于这部分,可以利用加法同态将其转换为下面的式子,转换公式如下:for This part can be converted into the following formula by using additive homomorphism. The conversion formula is as follows:
由于上面的转换公式,计算服务器CS将进行转换,转换公式如下:Due to the conversion formula above, the calculation server CS will To convert, the conversion formula is as follows:
在计算服务器CS具有明文、密文模板TA,和加密的候选模板集合的前提下,计算服务器CS可以检查密文模板和每个候选模板的欧几里德距离,结果中的最小欧几里德距离是否满足设置的阈值T;如果小于设置的阈值T,计算服务器CS认为认证通过;否则,计算服务器CS认为认证失败。There is plaintext and ciphertext template T A in computing server CS, and the encrypted candidate template set, the computing server CS can check the ciphertext template The Euclidean distance to each candidate template, the minimum Euclidean distance in the result Whether it satisfies the set threshold T; if it is less than the set threshold T, the computing server CS considers the authentication passed; otherwise, the computing server CS considers the authentication failed.
特征更新阶段包括:The feature update phase includes:
系统支持三种更新操作:添加、删除和修改,即新用户注册、现有用户撤销和基于可取消模板模块的现有用户密钥和特征模板的更新。具体过程如下:The system supports three update operations: add, delete, and modify, namely new user registration, existing user revocation, and update of existing user key and feature templates based on the cancelable template module. The specific process is as follows:
(1)新用户UADD通过提取器上传自己的生物特征数据,提取器对生物特征数据进行处理,分别生成加密的注册向量和加密的特征模板提取器将发送到计算服务器CS,计算服务器CS将其发送到数据库DB,数据库DB将添加到存储的加密索引中以完成新用户的注册;(1) The new user U ADD uploads his biometric data through the extractor, and the extractor processes the biometric data to generate encrypted registration vectors respectively and the encrypted feature template The extractor will to the calculation server CS, the calculation server CS sends it to the database DB, and the database DB will Added to the stored encrypted index to complete the registration of new users;
(2)现有用户撤销过程需要三个操作;首先,提取器收集并提取待撤销用户UDEL的生物特征;此外,提取器利用注册密钥生成匹配索引条目然后,提取器将索引条目发送给计算服务器CS,计算服务器CS将其发送到数据库DB;最后,数据库DB在其存储的索引上删除索引条目和匹配的加密模板 (2) The existing user revocation process requires three operations; first, the extractor collects and extracts the biometrics of the user U DEL to be revoked; in addition, the extractor utilizes the registration key generate matching index entries The extractor will then index the entry Sent to Compute Server CS, Compute Server CS sends it to Database DB; Finally, Database DB deletes the index entry on the index it stores and the matching encryption template
(3)当用户Ui的生物模板损坏或被盗时,用户Ui可以基于可取消模板模块重新输入生物特征;首先,提取器提取用户生物特征并获得注册索引项和加密模板此外,提取器生成新的注册和模板密钥和然后,提取器将和发送给计算服务器CS,计算服务器CS将其发送到数据库DB;最后,数据库DB利用索引项去匹配索引I中与用户Ui相关的索引项删除索引项和相关的加密模板并将和插入到加密索引I中。(3) When the biological template of user U i is damaged or stolen, user U i can re-enter the biometric feature based on the cancelable template module; first, the extractor extracts the user biometric feature and obtains the registration index item and encrypted template Additionally, the extractor generates new registration and template keys and Then, the extractor will and Sent to the computing server CS, the computing server CS sends it to the database DB; finally, the database DB utilizes the index item To match the index items related to user U i in index I delete index entry and associated encryption templates and will and Insert into encrypted index I.
其中,TA:可信中心;CS:计算服务器;DB:数据库;Ui、Uj:认证用户;认证用户Ui的公钥;认证用户Ui的私钥;认证用户Ui的对称加密密钥;认证密钥;Ri:注册用户;索引构建密钥;vB:生物特征模板;vR:生物特征注册向量;Ti:候选模板;Paillier:一种同态加密算法;注册向量;扩展后的注册向量;I:加密索引;vA:特征向量;v′A:扩展后的特征向量;TA:生物特征模版;QA:认证查询;欧几里德距离;AES:一种对称加密算法;M:随机可逆矩阵;M-1:M的逆矩阵;m1、m2:随机数;v″i:特征候选向量;注册用户Ri的注册密钥;模板密钥;生物特征模板Ti的加密形式;注册向量的加密形式;Umax:数据库DB中的用户总数;生物特征模版TA的同态加密形式;EK(TA):生物特征模版TA的对称加密形式;认证用户Uj的对称密钥;变换后的查询;UADD:新用户;新用户UADD加密的注册向量;新用户UADD加密的特征模板;UDEL:待撤销用户;待撤销用户UDEL的注册密钥;与待撤销用户UDEL匹配的索引条目;与待撤销用户UDEL匹配的加密模板;用户Ui新的注册索引项;用户Ui新的加密模板;用户Ui新的注册密钥;用户Ui新的模板密钥;新定义的向量运算;||:字符串连接操作;∑:累加运算;Π:连乘运算。Among them, TA: trusted center; CS: computing server; DB: database; U i , U j : authenticated users; Authenticating the public key of user U i ; Authenticating the private key of user U i ; symmetric encryption key for authenticating user U i ; Authentication key; R i : registered user; Index construction key; v B : biometric template; v R : biometric registration vector; T i : candidate template; Paillier: a homomorphic encryption algorithm; registration vector; Extended registration vector; I: encrypted index; v A : feature vector; v′ A : extended feature vector; T A : biometric template; Q A : authentication query; Euclidean distance; AES: a symmetric encryption algorithm; M: random reversible matrix; M -1 : the inverse matrix of M; m 1 , m 2 : random numbers; v″ i : feature candidate vector; Registration key of registered user R i ; template key; An encrypted form of the biometric template T i ; registration vector encrypted form; U max : the total number of users in the database DB; The homomorphic encryption form of the biometric template T A ; E K (T A ): the symmetric encryption form of the biometric template T A ; symmetric key for authenticating user U j ; Transformed query; U ADD : new user; New user U ADD encrypted registration vector; Feature template encrypted by new user U ADD ; U DEL : user to be revoked; The registration key of the user U DEL to be revoked; Index entries matching the user U DEL to be revoked; The encryption template matching the user U DEL to be revoked; User U i 's new registration index item; User U i 's new encryption template; User U i new registration key; User U i new template key; Newly defined vector operations; ||: string concatenation operation; ∑: accumulation operation; Π: multiplication operation.
为了验证本发明的可用性,以下将展示并说明基于联合生物识别的轻量级生物认证方法SELBA在仿真下的测试结果,仿真环境:在CPU 2.10G Hz的PC机上,Windows环境。In order to verify the usability of the present invention, the test results of the lightweight biometric authentication method SELBA based on combined biometrics under simulation will be shown and explained below, and the simulation environment: on a PC with a CPU 2.10GHz, Windows environment.
图4、图5和图6是对基于联合生物识别的轻量级生物认证方法SELBA与其他经典的生物认证方法在不同数据库(ORL、Yale和FERET数据库)中的认证准确性和认证时间对比。结果表明,本发明方法在不同数据库中的准确性低于基于CNN的方法,高于基于Gabor和基于PCA的方法。当不同数据库中的数据量达到一定程度时,本发明方法的认证准确度可以稳定在95%以上。在不同方法下,时间消耗将随着数据量的增加而线性增加。本发明方法的时间消耗略高于基于Gabor和基于PCA方法的时间消耗,但基于CNN方法的时间消耗大约是其他方法的四倍。高准确度的方法必然伴随着高开销,虽然基于CNN的准确性最高,但在移动设备上的应用需要考虑身份认证的准确性和效率。与其他方法相比,本发明方法实现了认证低成本和高安全性需求之间的均衡。Figure 4, Figure 5 and Figure 6 are the comparisons of authentication accuracy and authentication time between the lightweight biometric authentication method SELBA based on joint biometrics and other classic biometric authentication methods in different databases (ORL, Yale, and FERET databases). The results show that the accuracy of the method of the present invention in different databases is lower than that based on CNN, and higher than that based on Gabor and PCA. When the amount of data in different databases reaches a certain level, the authentication accuracy of the method of the invention can be stabilized above 95%. Under different methods, the time consumption will increase linearly with the increase of data volume. The time consumption of the method of the present invention is slightly higher than that of the Gabor-based and PCA-based methods, but the time consumption of the CNN-based method is about four times that of other methods. High-accuracy methods are bound to be accompanied by high overhead. Although the accuracy based on CNN is the highest, the application on mobile devices needs to consider the accuracy and efficiency of identity authentication. Compared with other methods, the method of the invention realizes the balance between authentication low cost and high safety requirement.
图7、图8和图9是对基于联合生物识别的轻量级生物认证方法SELBA中LBP特征描述子的维度在不同数据库(ORL、Yale和FERET数据库)下对不同数据量的认证准确度的影响进行仿真。结果表明,在不同的数据库中,数据量越大,识别准确度越高。此外,描述符的维数越大,识别准确度越高。从图7、图8和图9可以看出,3×3维描述子的识别率比8×6维描述子高10%以上。根据仿真结果,可以观察到,与其他三种方法相比,本发明方法在保护生物数据隐私的基础上保持了较高的身份认证准确性,并且不会造成较大的额外计算开销。Figure 7, Figure 8 and Figure 9 are the authentication accuracy of different data volumes in different databases (ORL, Yale and FERET databases) for the dimensions of the LBP feature descriptor in the lightweight biometric authentication method SELBA based on joint biometrics Effects are simulated. The results show that in different databases, the larger the data volume, the higher the recognition accuracy. In addition, the larger the dimensionality of the descriptor, the higher the recognition accuracy. It can be seen from Fig. 7, Fig. 8 and Fig. 9 that the recognition rate of the 3×3 dimensional descriptor is more than 10% higher than that of the 8×6 dimensional descriptor. According to the simulation results, it can be observed that, compared with the other three methods, the method of the present invention maintains a high identity authentication accuracy on the basis of protecting the privacy of biological data, and does not cause large additional calculation overhead.
图10是对基于联合生物识别的轻量级生物认证方法SELBA与其他经典的生物认证方法在不同特征向量大小下生成密钥和生成令牌的时间对比。结果表明,本发明方法和Zhu等人的方法生成密钥的时间成本随着向量大小的增加而线性增加。当向量大小为16位时,创建密钥的平均时间分别约为110毫秒和290毫秒。当大小增加到256位时,它们的平均时间开销将分别增加到1100ms和1253ms。然而,对于Zhou等人的方法来说,当向量大小从16位增加到256位时,平均时间成本从100ms增加到2300ms,并呈现指数增长趋势。Zhou等人的方法使用矩阵作为密钥,矩阵大小将与向量大小同步变化,而本发明方法和Zhu等人的方法基于同态加密,因此密钥大小可以不受向量大小的影响。此外,三种方法中生成令牌的时间成本也随着向量维数的增加而增加,但增加远小于密钥生成。当大小为16位时,本发明方法、Zhu等人的方法和Zhou等人的方法生成令牌平均时间分别约为30ms、220ms和60ms。当大小增加到256位时,平均时间分别达到150ms、1200ms和860ms左右。由于Zhu等人的方法引入的双线性配对,在令牌生成过程中,其开销大大高于其他两种方法。仿真结果表明,本发明方法生成密钥和生成令牌的时间成本处于低水平,相比于其他生物认证方法在实际中具有优势。Figure 10 is a comparison of the time of key generation and token generation under different eigenvector sizes between the lightweight biometric authentication method SELBA based on joint biometric identification and other classic biometric authentication methods. The results show that the time cost of key generation for the method of the present invention and the method of Zhu et al. increases linearly with the increase of vector size. When the vector size is 16 bits, the average time to create the key is about 110 ms and 290 ms, respectively. When the size increases to 256 bits, their average time overhead increases to 1100ms and 1253ms, respectively. However, for the method of Zhou et al., when the vector size increases from 16 bits to 256 bits, the average time cost increases from 100ms to 2300ms, showing an exponential growth trend. The method of Zhou et al. uses a matrix as a key, and the size of the matrix will change synchronously with the size of the vector, while the method of the present invention and the method of Zhu et al. are based on homomorphic encryption, so the size of the key can not be affected by the size of the vector. In addition, the time cost of token generation in the three methods also increases with the increase of vector dimension, but the increase is much smaller than that of key generation. When the size is 16 bits, the average token generation time of the method of the present invention, the method of Zhu et al. and the method of Zhou et al. is about 30ms, 220ms and 60ms respectively. When the size was increased to 256 bits, the average times reached around 150ms, 1200ms and 860ms respectively. Due to the bilinear pairing introduced by the method of Zhu et al., its overhead is significantly higher than the other two methods during token generation. Simulation results show that the method of the present invention has a low time cost for key generation and token generation, and has advantages in practice compared with other biometric authentication methods.
图11是对基于联合生物识别的轻量级生物认证方法SELBA与其他经典的生物认证方法在FERET数据库中索引构建的时间对比。这三个方法的索引结构均是反向索引,索引构建的时间成本都随着训练数据量的增加而线性增长。当训练数据量为200时,本发明方法、Zhu等人的方法和Zhou等人的方法的平均时间开销分别保持在0.16s、0.45s和0.38s左右。当数据量增加到1000时,成本增加到10秒、12秒和9秒左右。仿真结果表明,在实际应用中,本发明方法的索引构造的时间开销在可接受的范围内。Figure 11 is a time comparison of index construction in the FERET database between the lightweight biometric authentication method SELBA based on joint biometrics and other classic biometric authentication methods. The index structures of these three methods are all inverted indexes, and the time cost of index construction increases linearly with the increase of the amount of training data. When the amount of training data is 200, the average time overhead of the method of the present invention, the method of Zhu et al. and the method of Zhou et al. is kept at about 0.16s, 0.45s and 0.38s respectively. When the amount of data increases to 1000, the cost increases to about 10 seconds, 12 seconds and 9 seconds. Simulation results show that in practical applications, the time overhead of the index construction of the method of the present invention is within an acceptable range.
图12是对基于联合生物识别的轻量级生物认证方法SELBA与其他经典的生物认证方法在FERET数据库中查询的时间对比。本发明方法、Zhu等人的方法和Zhou等人的方法的查询时间随着向量大小的增加呈指数增长趋势。当向量大小为16位时,训练数据的变化对查询时间成本的影响很小,而当向量大小为64或256位时,训练数据的变化将极大地影响查询开销。然而,较小的特征向量大小不能很好地描述特征。在实际应用场景中,将特征向量设置为64位是一种考虑准确性和效率的较好选择。仿真结果表明,与其他方法相比,本发明方法实现了认证低成本和高安全性需求之间的均衡。Figure 12 is a comparison of query time in the FERET database between the lightweight biometric authentication method SELBA based on joint biometrics and other classic biometric authentication methods. The query time of the method of the present invention, the method of Zhu et al. and the method of Zhou et al. increases exponentially with the increase of the vector size. When the vector size is 16 bits, the variation of the training data has little impact on the query time cost, while when the vector size is 64 or 256 bits, the variation of the training data will greatly affect the query overhead. However, smaller eigenvector sizes do not describe features well. In practical application scenarios, setting the feature vector to 64 bits is a better choice considering accuracy and efficiency. Simulation results show that, compared with other methods, the method of the present invention achieves a balance between authentication low cost and high security requirements.
图13、图14和图15是对基于联合生物识别的轻量级生物认证方法SELBA与其他经典的生物认证方法在不同向量大小和数据量下加密向量计算的时间开销对比。图13和图14分别显示了当向量大小为16位和64位时,时间开销随数据量的增加而变化。其中,Zhu等人的方法的成本远高于本发明方法和Zhou等人的方法。这主要是由于Zhu等人的方法的计算过程包含许多线性配对运算,并且在计算之前需要验证令牌的有效性。图15显示了当向量大小增加到256位时,本发明方法和Zhou等人的方法在不同数据量下的时间成本逐渐接近Zhu等人的方法。仿真结果表明,与其他方法相比,本发明方法实现了认证低成本和高安全性需求之间的均衡。Fig. 13, Fig. 14 and Fig. 15 are comparisons of the time overhead of encryption vector calculation under different vector sizes and data volumes between the lightweight biometric authentication method SELBA based on joint biometrics and other classic biometric authentication methods. Figure 13 and Figure 14 show the variation of time overhead as the amount of data increases when the vector size is 16 bits and 64 bits, respectively. Among them, the cost of the method of Zhu et al. is much higher than the method of the present invention and the method of Zhou et al. This is mainly due to the fact that the calculation process of Zhu et al.'s method contains many linear pairing operations, and the validity of tokens needs to be verified before calculation. Figure 15 shows that when the vector size increases to 256 bits, the time cost of the method of the present invention and the method of Zhou et al. under different data volumes gradually approach the method of Zhu et al. Simulation results show that, compared with other methods, the method of the present invention achieves a balance between authentication low cost and high security requirements.
应当注意,本发明方法可以通过硬件、软件或者软件和硬件的结合来实现,硬件部分可以利用专用逻辑来实现;软件部分可以存储在存储器中,由适当的指令执行系统,例如微处理器或者专用设计硬件来执行。本领域的普通技术人员可以理解上述的设备和方法可以使用计算机可执行指令和/或包含在处理器控制代码中来实现,例如在诸如磁盘、CD或DVD-ROM的载体介质、诸如只读存储器(固件)的可编程的存储器或者诸如光学或电子信号载体的数据载体上提供了这样的代码。本发明的设备及其模块可以由诸如超大规模集成电路或门阵列、诸如逻辑芯片、晶体管等的半导体、或者诸如现场可编程门阵列、可编程逻辑设备等的可编程硬件设备的硬件电路实现,也可以用由各种类型的处理器执行的软件实现,也可以由上述硬件电路和软件的结合例如固件来实现。It should be noted that the method of the present invention can be realized by hardware, software or a combination of software and hardware, and the hardware part can be realized by using dedicated logic; the software part can be stored in a memory, and executed by an appropriate instruction system, such as a microprocessor or a dedicated Design the hardware to execute. Those of ordinary skill in the art will understand that the above-described devices and methods can be implemented using computer-executable instructions and/or contained in processor control code, for example, on a carrier medium such as a magnetic disk, CD or DVD-ROM, such as a read-only memory Such code is provided on a programmable memory (firmware) or on a data carrier such as an optical or electronic signal carrier. The device and its modules of the present invention may be implemented by hardware circuits such as VLSI or gate arrays, semiconductors such as logic chips, transistors, etc., or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., It can also be realized by software executed by various types of processors, or by a combination of the above-mentioned hardware circuits and software such as firmware.
以上仅为本发明的实施例,但本发明保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,都应涵盖在本发明的保护范围之内。The above is only an embodiment of the present invention, but the scope of protection of the present invention is not limited thereto. Anyone familiar with the technical field within the technical scope disclosed in the present invention, any work done within the spirit and principles of the present invention Modifications, equivalent replacements and improvements, etc., should all be covered within the protection scope of the present invention.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210945193.2A CN115278673B (en) | 2022-08-08 | 2022-08-08 | Lightweight biological authentication method and system based on combined biological recognition |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210945193.2A CN115278673B (en) | 2022-08-08 | 2022-08-08 | Lightweight biological authentication method and system based on combined biological recognition |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN115278673A true CN115278673A (en) | 2022-11-01 |
| CN115278673B CN115278673B (en) | 2024-07-23 |
Family
ID=83748315
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202210945193.2A Active CN115278673B (en) | 2022-08-08 | 2022-08-08 | Lightweight biological authentication method and system based on combined biological recognition |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN115278673B (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115913580A (en) * | 2023-02-21 | 2023-04-04 | 杭州天谷信息科技有限公司 | Homomorphic encryption-based biometric authentication method and system |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20150341349A1 (en) * | 2014-05-23 | 2015-11-26 | Fujitsu Limited | Privacy-preserving biometric authentication |
| CN107919965A (en) * | 2018-01-05 | 2018-04-17 | 杭州电子科技大学 | A kind of biological characteristic sensitive information outsourcing identity identifying method based on homomorphic cryptography |
| CN108475309A (en) * | 2015-08-21 | 2018-08-31 | 维尔蒂姆知识产权有限公司 | System and method for biological characteristic consensus standard |
| CN112329519A (en) * | 2020-09-21 | 2021-02-05 | 中国人民武装警察部队工程大学 | A Secure Online Fingerprint Matching Method |
| US20210124815A1 (en) * | 2019-10-25 | 2021-04-29 | Visa International Service Association | Optimized private biometric matching |
| CN112733111A (en) * | 2020-12-31 | 2021-04-30 | 暨南大学 | Threshold predicate encryption biometric feature authentication method based on segment segmentation |
| CN113239336A (en) * | 2021-06-02 | 2021-08-10 | 西安电子科技大学 | Privacy protection biological characteristic authentication method based on decision tree |
| US20220109574A1 (en) * | 2020-10-01 | 2022-04-07 | Tata Consultancy Services Limited | Method and system for privacy preserving multifactor biometric authentication |
-
2022
- 2022-08-08 CN CN202210945193.2A patent/CN115278673B/en active Active
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20150341349A1 (en) * | 2014-05-23 | 2015-11-26 | Fujitsu Limited | Privacy-preserving biometric authentication |
| CN108475309A (en) * | 2015-08-21 | 2018-08-31 | 维尔蒂姆知识产权有限公司 | System and method for biological characteristic consensus standard |
| CN107919965A (en) * | 2018-01-05 | 2018-04-17 | 杭州电子科技大学 | A kind of biological characteristic sensitive information outsourcing identity identifying method based on homomorphic cryptography |
| US20210124815A1 (en) * | 2019-10-25 | 2021-04-29 | Visa International Service Association | Optimized private biometric matching |
| CN112329519A (en) * | 2020-09-21 | 2021-02-05 | 中国人民武装警察部队工程大学 | A Secure Online Fingerprint Matching Method |
| US20220109574A1 (en) * | 2020-10-01 | 2022-04-07 | Tata Consultancy Services Limited | Method and system for privacy preserving multifactor biometric authentication |
| CN112733111A (en) * | 2020-12-31 | 2021-04-30 | 暨南大学 | Threshold predicate encryption biometric feature authentication method based on segment segmentation |
| CN113239336A (en) * | 2021-06-02 | 2021-08-10 | 西安电子科技大学 | Privacy protection biological characteristic authentication method based on decision tree |
Non-Patent Citations (4)
| Title |
|---|
| GOMEZ B M ET AL.: "Multi-biometric template protection based on homomorphic encryption", PATTERN RECOGNITION, 31 December 2017 (2017-12-31) * |
| 张宁;臧亚丽;田捷;: "生物特征与密码技术的融合――一种新的安全身份认证方案", 密码学报, no. 02, 15 April 2015 (2015-04-15) * |
| 杨雄;张晓惠;: "基于全同态加密的人脸特征密文认证系统", 微电子学与计算机, no. 09, 5 September 2020 (2020-09-05) * |
| 王会勇;唐士杰;丁勇;王玉珏;李佳慧;: "生物特征识别模板保护综述", 计算机研究与发展, no. 05, 15 May 2020 (2020-05-15) * |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115913580A (en) * | 2023-02-21 | 2023-04-04 | 杭州天谷信息科技有限公司 | Homomorphic encryption-based biometric authentication method and system |
Also Published As
| Publication number | Publication date |
|---|---|
| CN115278673B (en) | 2024-07-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Yuan et al. | Efficient privacy-preserving biometric identification in cloud computing | |
| US8842887B2 (en) | Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device | |
| Wang et al. | A blind system identification approach to cancelable fingerprint templates | |
| JP6037366B2 (en) | Method for authenticating user corresponding to encrypted data and system for authenticating user corresponding to biometric data | |
| US9887989B2 (en) | Protecting passwords and biometrics against back-end security breaches | |
| Zhao et al. | Negative iris recognition | |
| JP2020520509A (en) | Biometric identification system and method | |
| JP2000315999A (en) | Cryptographic key generating method | |
| Jindal et al. | Secure and privacy preserving method for biometric template protection using fully homomorphic encryption | |
| Morampudi et al. | Secure and verifiable iris authentication system using fully homomorphic encryption | |
| Govindarajan et al. | Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data | |
| KR102274132B1 (en) | User authentication server that performs verification of electronic signature data generated based on biometric authentication in association with a plurality of verification servers and operating method thereof | |
| US20070038863A1 (en) | System and Method for Decoupling Identification from Biometric Information in Biometric Access Systems | |
| CN114065169A (en) | Privacy protection biometric authentication method and device and electronic equipment | |
| Kuznetsov et al. | Deep learning-based biometric cryptographic key generation with post-quantum security | |
| Zhu et al. | A two-step hybrid approach for voiceprint-biometric template protection | |
| CN105553980A (en) | Safety fingerprint identification system and method based on cloud computing | |
| Wang et al. | Joint biological ID: A secure and efficient lightweight biometric authentication scheme | |
| Wang et al. | A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system | |
| Wilber et al. | Secure remote matching with privacy: Scrambled support vector vaulted verification (s 2 v 3) | |
| Teoh et al. | Cancellable biometrics and user-dependent multi-state discretization in BioHash | |
| CN115278673B (en) | Lightweight biological authentication method and system based on combined biological recognition | |
| Selimovic et al. | Authentication based on the image encryption using delaunay triangulation and catalan objects | |
| Sharma et al. | Fully homomorphic encryption operators for score and decision fusion in biometric identification | |
| Kumar et al. | Secure Data Storage and Retrieval over the Encrypted Cloud Computing |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |