[go: up one dir, main page]

CN115278673A - Lightweight biometric authentication method and system based on joint biometrics - Google Patents

Lightweight biometric authentication method and system based on joint biometrics Download PDF

Info

Publication number
CN115278673A
CN115278673A CN202210945193.2A CN202210945193A CN115278673A CN 115278673 A CN115278673 A CN 115278673A CN 202210945193 A CN202210945193 A CN 202210945193A CN 115278673 A CN115278673 A CN 115278673A
Authority
CN
China
Prior art keywords
template
extractor
user
vector
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210945193.2A
Other languages
Chinese (zh)
Other versions
CN115278673B (en
Inventor
樊凯
王昊洋
肖进
陈红艳
高楠
李晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN202210945193.2A priority Critical patent/CN115278673B/en
Publication of CN115278673A publication Critical patent/CN115278673A/en
Application granted granted Critical
Publication of CN115278673B publication Critical patent/CN115278673B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

In the method and the system for lightweight biometric authentication based on joint biometric identification, a trusted center generates a series of keys; the extractor constructs a d-vitamin feature registration vector and a biological feature template by confusing the biological feature template, and encrypts the feature template by using a public key of a homomorphic encryption algorithm; the extractor expands the registration vector, encrypts and sends the registration vector to a calculation server by using a registration key, and encrypts and sends an index to a database by the calculation server; the extractor expands the characteristic vector, encrypts the expanded vector and the biological characteristic template and sends the encrypted expanded vector and the encrypted biological characteristic template to the computing server; the database transforms the received index and the authentication query, calculates the similarity between each registration template and the authentication query, and sends the candidate template set to a calculation server to calculate the Euclidean distance; three update operations are supported: add, delete, and modify; the invention meets the confidentiality, renewability, revocable, irreversibility and non-connectability of biological identification, and realizes the balance of low-cost authentication and high-safety requirements.

Description

基于联合生物识别的轻量级生物认证方法及系统Lightweight biometric authentication method and system based on joint biometrics

技术领域technical field

本发明属于生物特征识别技术领域,尤其涉及一种基于联合生物识别的轻量级生物认证方法及系统。The invention belongs to the technical field of biometric identification, and in particular relates to a lightweight biometric authentication method and system based on joint biometric identification.

背景技术Background technique

近年来,智能移动设备的普及不断提高了人们的生活质量,移动设备的市场规模也在不断扩大,此外,智能手表、平板电脑和其他移动设备也在推动移动市场的扩张。虽然移动设备给人们带来了便利,但它们也对用户的隐私和安全构成了威胁。随着用户将个人敏感信息(如银行账户和图像数据)存储在智能移动设备上,个人隐私的泄漏也成为研究者关注的焦点。In recent years, the popularity of smart mobile devices has continuously improved people's quality of life, and the market size of mobile devices is also expanding. In addition, smart watches, tablet computers and other mobile devices are also driving the expansion of the mobile market. While mobile devices bring convenience to people, they also pose a threat to users' privacy and security. As users store personal sensitive information (such as bank account and image data) on smart mobile devices, the leakage of personal privacy has also become the focus of researchers.

现有的大多数智能移动设备都利用基于知识的身份认证机制来确保自身的安全性和数据隐私(如基于PIN码、基于模式的密码认证)。然而,大多数用户倾向于设置简单而弱的密码以便于记忆。这种基于知识的身份验证易受监听攻击和字典攻击,因此攻击者可以获得访问存储在设备中的个人敏感信息的权限。生物特征技术利用其独特性、通用性、稳定性和可获取性,推动了生物特征认证的不断发展,使生物特征认证更加方便、准确。它还克服了基于知识的身份验证中密码设置的漏洞。Most existing smart mobile devices use knowledge-based identity authentication mechanisms to ensure their own security and data privacy (such as PIN code-based, pattern-based password authentication). However, most users tend to set simple and weak passwords that are easy to remember. This knowledge-based authentication is vulnerable to snooping and dictionary attacks, whereby attackers can gain access to sensitive personal information stored on the device. Using its uniqueness, versatility, stability and availability, biometric technology has promoted the continuous development of biometric authentication, making biometric authentication more convenient and accurate. It also overcomes the vulnerability of password settings in knowledge-based authentication.

通过上述分析,现有技术存在的问题及缺陷为:现有的生物认证方法大多基于单个生物特征,准确性和稳定性不高,并且无法应用于不同的应用背景;此外,现有的生物认证方法的安全性不高,一旦生物特征被盗、损坏或伪造,基于生物特征的身份认证可能会受到人工合成、重播、和欺骗攻击的威胁。Through the above analysis, the problems and defects of the existing technology are: most of the existing biometric authentication methods are based on a single biometric feature, the accuracy and stability are not high, and they cannot be applied to different application backgrounds; in addition, the existing biometric authentication methods The security of the method is not high. Once the biometric feature is stolen, damaged or forged, the identity authentication based on the biometric feature may be threatened by artificial synthesis, replay, and spoofing attacks.

解决以上问题及缺陷的难度为:(1)智能移动设备的计算能力和存储能力是有限的,所以需要设计一种轻量级生物认证方法。(2)现有的生物认证方法大多基于单个生物特征,准确性和稳定性不高,并且无法应用于不同的应用背景,所以设计的方法需要能够将这些生物特征整合起来,实现各种生物特征信息的综合应用。(3)由于生物特征的独特性,一旦生物特征被盗、损坏或伪造,基于生物特征的身份认证可能会受到人工合成、重播、和欺骗攻击的威胁。所以,设计的方法需要能够在生物特征被窃取或损坏后重建用户生物特征模板。The difficulties in solving the above problems and defects are as follows: (1) The computing power and storage capacity of smart mobile devices are limited, so it is necessary to design a lightweight biometric authentication method. (2) Most of the existing biometric authentication methods are based on a single biometric feature, the accuracy and stability are not high, and they cannot be applied to different application backgrounds, so the designed method needs to be able to integrate these biometric features to achieve various biometric features Comprehensive application of information. (3) Due to the uniqueness of biometrics, once the biometrics are stolen, damaged or forged, identity authentication based on biometrics may be threatened by artificial synthesis, replay, and spoofing attacks. Therefore, the designed method needs to be able to reconstruct the user biometric template after the biometric is stolen or damaged.

发明内容Contents of the invention

为了克服上述现有技术的缺点,本发明的目的在于提供了一种基于联合生物识别的轻量级生物认证方法及系统,适应于现阶段智能移动设备的应用环境,结合基于知识的认证和基于多个生物特征的认证可以克服仅使用密码认证的低安全性,应用可取消模板模块可以防止生物模板在被盗或损坏后的不可恢复性,具有高安全性、低开销的优点。In order to overcome the shortcomings of the above-mentioned prior art, the purpose of the present invention is to provide a lightweight biometric authentication method and system based on joint biometrics, which is suitable for the application environment of smart mobile devices at the present stage, and combines knowledge-based authentication and authentication-based The authentication of multiple biometrics can overcome the low security of password authentication only, and the application of the cancelable template module can prevent the irrecoverability of the biometric template after being stolen or damaged, which has the advantages of high security and low overhead.

为了达到上述目的,本发明采取的技术方案为:In order to achieve the above object, the technical scheme that the present invention takes is:

一种基于联合生物识别的轻量级生物认证方法,包括以下步骤:A lightweight biometric authentication method based on joint biometrics, comprising the following steps:

S101:可信中心TA生成一系列密钥,为认证用户Ui生成公钥

Figure BDA0003786993380000021
私钥
Figure BDA0003786993380000022
对称加密密钥
Figure BDA0003786993380000023
和认证密钥
Figure BDA0003786993380000024
为注册用户Ri生成索引构建密钥
Figure BDA0003786993380000025
S101: The trusted center TA generates a series of keys, and generates a public key for the authenticated user U i
Figure BDA0003786993380000021
private key
Figure BDA0003786993380000022
Symmetric encryption key
Figure BDA0003786993380000023
and authentication key
Figure BDA0003786993380000024
Generate an index build key for registered user R i
Figure BDA0003786993380000025

S102:提取器通过混淆生物特征模板vB来构造d维生物特征注册向量vR和生物特征模板Ti,并使用同态加密算法Paillier的公钥加密生物特征模板TiS102: The extractor constructs a d-dimensional biometric registration vector v R and a biometric template T i by confusing the biometric template v B , and encrypts the biometric template T i using the homomorphic encryption algorithm Paillier's public key;

S103:提取器扩展注册向量

Figure BDA0003786993380000026
Figure BDA0003786993380000027
使用注册密钥
Figure BDA0003786993380000028
加密
Figure BDA0003786993380000029
Figure BDA00037869933800000210
发送给计算服务器CS,计算服务器CS加密索引I并发送给数据库DB;S103: Extractor extension registration vector
Figure BDA0003786993380000026
arrive
Figure BDA0003786993380000027
use registration key
Figure BDA0003786993380000028
encryption
Figure BDA0003786993380000029
Will
Figure BDA00037869933800000210
Send to the calculation server CS, the calculation server CS encrypts the index I and sends it to the database DB;

S104:提取器扩展特征向量vA到v′A,对扩展的特征向量v′A和生物特征模版TA进行加密,并将

Figure BDA00037869933800000211
和EK(TA)发送给计算服务器CS;S104: The extractor expands the feature vector v A to v′ A , encrypts the extended feature vector v′ A and the biometric template T A , and
Figure BDA00037869933800000211
and E K (T A ) are sent to the computing server CS;

S105:数据库DB对接收到的加密索引I和认证查询QA进行变换,计算每个注册模板和认证查询QA之间的相似性,将候选模板集合发送给计算服务器CS,以便计算服务器CS计算欧几里德距离

Figure BDA00037869933800000212
S105: The database DB transforms the received encrypted index I and the authentication query Q A , calculates the similarity between each registration template and the authentication query Q A , and sends the set of candidate templates to the calculation server CS, so that the calculation server CS can calculate Euclidean distance
Figure BDA00037869933800000212

S106:支持三种更新操作:添加、删除和修改,即新用户注册、现有用户撤销和基于可取消模板模块的现有用户密钥和特征模板的更新。S106: Support three update operations: add, delete and modify, ie new user registration, existing user revocation, and update of existing user keys and feature templates based on cancelable template modules.

所述的基于联合生物识别的轻量级生物认证方法包括生成密钥阶段、加密特征阶段、生成索引阶段、生成令牌阶段、认证阶段和特征更新阶段;The described light-weight biometric authentication method based on joint biometric identification includes a key generation phase, an encryption feature phase, an index generation phase, a token generation phase, an authentication phase and a feature update phase;

生成密钥阶段包括:The key generation phase includes:

(1)可信中心TA为认证用户Ui生成两个大素数p、q,并基于同态加密算法Paillier生成公钥

Figure BDA0003786993380000031
其中n=pq,g是小于n2的随机数;私钥
Figure BDA0003786993380000032
其中α=lcm(p-1,q-1),
Figure BDA0003786993380000033
此外,可信中心TA为认证用户Ui基于对称加密算法AES生成对称加密密钥
Figure BDA0003786993380000034
(1) The trusted center TA generates two large prime numbers p and q for the authenticated user U i , and generates a public key based on the homomorphic encryption algorithm Paillier
Figure BDA0003786993380000031
Where n=pq, g is a random number less than n 2 ; the private key
Figure BDA0003786993380000032
where α = lcm(p-1, q-1),
Figure BDA0003786993380000033
In addition, the trusted center TA generates a symmetric encryption key for the authenticated user U i based on the symmetric encryption algorithm AES
Figure BDA0003786993380000034

(2)首先,可信中心TA为认证用户Ui生成一个随机可逆矩阵及其逆矩阵M,M-1∈Z2d ×2d,其中d是特征向量的维数;然后,对于每个认证用户Ui,可信中心TA生成两个随机矩阵

Figure BDA0003786993380000035
作为认证密钥,其中
Figure BDA0003786993380000036
最后,对于每个注册用户Ri,可信中心TA生成两个随机矩阵
Figure BDA0003786993380000037
作为索引构建密钥,其中
Figure BDA0003786993380000038
(2) First, the trusted center TA generates a random reversible matrix and its inverse matrix M for the authenticated user U i , M -1 ∈ Z 2d ×2d , where d is the dimension of the feature vector; then, for each authenticated user U i , the trusted center TA generates two random matrices
Figure BDA0003786993380000035
As an authentication key, where
Figure BDA0003786993380000036
Finally, for each registered user R i , the trusted center TA generates two random matrices
Figure BDA0003786993380000037
As an index build key, where
Figure BDA0003786993380000038

加密特征阶段包括:The encryption feature phase includes:

(1)通过人脸和指纹特征提取,获得N个M维向量

Figure BDA00037869933800000314
和一个n维向量vf;定义操作
Figure BDA0003786993380000039
计算公式如下:(1) Obtain N M-dimensional vectors through face and fingerprint feature extraction
Figure BDA00037869933800000314
and an n-dimensional vector v f ; define the operation
Figure BDA0003786993380000039
Calculated as follows:

Figure BDA00037869933800000310
Figure BDA00037869933800000310

获得的混淆生物特征模板如下:The obfuscated biometric template obtained is as follows:

Figure BDA00037869933800000311
Figure BDA00037869933800000311

(2)提取器首先在vB的每个向量中随机选择m1(m1∈M)个数字,获取每个向量中相关下标的数据来构造特征候选向量v″i(i=1,…,N),随机生成的下标定义为用户的注册密钥

Figure BDA00037869933800000312
提取器基于“字符串连接”操作连接特征候选向量来构建d维生物特征注册向量,计算公式如下:(2) The extractor first randomly selects m 1 (m 1 ∈ M) numbers in each vector of v B , obtains the relevant subscript data in each vector to construct the feature candidate vector v″ i (i=1,… , N), the randomly generated subscript is defined as the user's registration key
Figure BDA00037869933800000312
The extractor constructs a d-dimensional biometric registration vector by concatenating feature candidate vectors based on the "string concatenation" operation, and the calculation formula is as follows:

vR=v″1||v″2||…||v″N v R =v″ 1 ||v″ 2 ||…||v″ N

(3)提取器在vB的每个向量中随机选择m2(m2∈M)个数字,随机生成的下标定义为用户的模板密钥

Figure BDA00037869933800000313
获取每个向量中相关下标的数据来构造生物特征模板Ti,计算公式如下:(3) The extractor randomly selects m 2 (m 2 ∈ M) numbers in each vector of v B , and the randomly generated subscript is defined as the template key of the user
Figure BDA00037869933800000313
Obtain the relevant subscript data in each vector to construct the biometric template T i , the calculation formula is as follows:

Figure BDA0003786993380000041
Figure BDA0003786993380000041

(4)提取器使用同态加密算法Paillier的公钥加密生物特征模板Ti,加密公式如下:(4) The extractor uses the homomorphic encryption algorithm Paillier's public key to encrypt the biometric template T i , and the encryption formula is as follows:

Figure BDA0003786993380000042
Figure BDA0003786993380000042

生成索引阶段包括:The build index phase includes:

(1)首先,提取器扩展每个注册向量

Figure BDA0003786993380000043
Figure BDA0003786993380000044
扩展公式如下:(1) First, the extractor expands each registration vector
Figure BDA0003786993380000043
arrive
Figure BDA0003786993380000044
The expansion formula is as follows:

Figure BDA0003786993380000045
Figure BDA0003786993380000045

其中

Figure BDA0003786993380000046
是提取器为每个注册向量
Figure BDA0003786993380000047
随机选择的数字;in
Figure BDA0003786993380000046
is the extractor for each registration vector
Figure BDA0003786993380000047
randomly selected numbers;

(2)然后,提取器使用注册密钥

Figure BDA0003786993380000048
加密
Figure BDA0003786993380000049
加密公式如下:(2) Then, the extractor uses the registration key
Figure BDA0003786993380000048
encryption
Figure BDA0003786993380000049
The encryption formula is as follows:

Figure BDA00037869933800000410
Figure BDA00037869933800000410

其中,

Figure BDA00037869933800000411
p1>>p2并且γ>>2|max(εi)|,
Figure BDA00037869933800000412
定义为从概率分布中随机选择的整数混淆向量;
Figure BDA00037869933800000413
是由注册向量
Figure BDA00037869933800000414
组成的密文;提取器以元组
Figure BDA00037869933800000415
的形式将
Figure BDA00037869933800000416
Figure BDA00037869933800000417
从注册用户Ri传输给计算服务器CS;当计算服务器CS收到所有注册用户的加密元祖时,将创建加密索引
Figure BDA00037869933800000418
其中Umax表示数据库DB中的用户总数;加密索引I将由计算服务器CS传输到数据库DB中进行存储。in,
Figure BDA00037869933800000411
p 1 >>p 2 and γ>>2|max(ε i )|,
Figure BDA00037869933800000412
Defined as an integer confusion vector randomly selected from the probability distribution;
Figure BDA00037869933800000413
is given by the registration vector
Figure BDA00037869933800000414
The composed ciphertext; the extractor takes the tuple
Figure BDA00037869933800000415
in the form of
Figure BDA00037869933800000416
and
Figure BDA00037869933800000417
Transmitted from registered user R i to computing server CS; when computing server CS receives encrypted tuples of all registered users, an encrypted index will be created
Figure BDA00037869933800000418
Where U max represents the total number of users in the database DB; the encrypted index I will be transmitted by the computing server CS to the database DB for storage.

生成令牌阶段包括:The token generation phase includes:

(1)首先,提取器从认证用户Uj的生物特征中提取特征向量vA和具有注册密钥

Figure BDA00037869933800000419
和模板密钥
Figure BDA00037869933800000420
的生物特征模板TA;(1) First, the extractor extracts the feature vector v A from the biometric feature of the authenticated user U j and has the registration key
Figure BDA00037869933800000419
and the template key
Figure BDA00037869933800000420
biometric template T A ;

(2)然后,提取器扩展特征向量vA到v′A,扩展公式如下:(2) Then, the extractor expands the feature vector v A to v′ A , and the expansion formula is as follows:

Figure BDA00037869933800000421
Figure BDA00037869933800000421

其中

Figure BDA00037869933800000422
是提取器为认证用户Uj的认证查询随机选择的数字,需要注意ηj是正数;in
Figure BDA00037869933800000422
is the number randomly selected by the extractor for the authentication query of the authenticated user U j , it should be noted that η j is a positive number;

(3)接着,提取器使用认证用户Uj的认证密钥

Figure BDA0003786993380000051
对扩展向量v′A进行加密,加密公式如下:(3) Next, the extractor uses the authentication key of the authenticated user U j
Figure BDA0003786993380000051
Encrypt the extended vector v′ A , the encryption formula is as follows:

Figure BDA0003786993380000052
Figure BDA0003786993380000052

其中

Figure BDA0003786993380000053
是由提取器随机选择的整数混淆向量;提取器将加密的认证查询QA发送给计算服务器CS,然后再将认证查询QA发送给数据库DB进行认证;in
Figure BDA0003786993380000053
is an integer confusion vector randomly selected by the extractor; the extractor sends the encrypted authentication query Q A to the computing server CS, and then sends the authentication query Q A to the database DB for authentication;

(4)提取器使用认证用户Uj的同态加密算法Paillier的公钥

Figure BDA0003786993380000054
对生物特征模版TA进行加密以获得密文
Figure BDA0003786993380000055
除此之外,提取器使用认证用户Uj的对称密钥
Figure BDA0003786993380000056
对生物特征模版TA进行加密以获得密文EK(TA);提取器将
Figure BDA0003786993380000057
和EK(TA)发送给计算服务器CS,用于后续密文的欧几里德距离计算。(4) The extractor uses the public key of the homomorphic encryption algorithm Paillier of the authenticated user U j
Figure BDA0003786993380000054
Encrypt the biometric template T A to obtain the ciphertext
Figure BDA0003786993380000055
Among other things, the extractor authenticates the user U j using the symmetric key
Figure BDA0003786993380000056
Encrypt the biometric template T A to obtain the ciphertext E K (T A ); the extractor will
Figure BDA0003786993380000057
and E K (T A ) are sent to the computing server CS for Euclidean distance calculation of subsequent ciphertexts.

认证阶段包括:The certification phase includes:

认证过程包括三个步骤:首先,数据库DB对接收到的加密索引I和认证查询QA进行变换;然后,数据库DB根据其存储的加密索引

Figure BDA0003786993380000058
汁算每个注册模板和认证查询QA之间的相似性;最后,数据库DB将候选模板集合发送给计算服务器CS,以便计算服务器CS使用与候选集和密文
Figure BDA0003786993380000059
相关的特征模板去计算两者之间的欧几里德距离;具体过程如下:The authentication process includes three steps: first, the database DB transforms the received encrypted index I and the authentication query Q A ; then, the database DB transforms the received encrypted index I according to its stored encrypted index
Figure BDA0003786993380000058
Calculate the similarity between each registration template and the authentication query Q A ; finally, the database DB sends the set of candidate templates to the computing server CS, so that the computing server CS uses the candidate set and the ciphertext
Figure BDA0003786993380000059
Related feature templates to calculate the Euclidean distance between the two; the specific process is as follows:

(1)数据库DB对从提取器接收到的加密索引

Figure BDA00037869933800000510
中的每一个
Figure BDA00037869933800000511
进行变换;然后,数据库DB再对从提取器接收到的认证查询QA进行变换,变换公式如下:(1) The database DB pairs the encrypted index received from the extractor
Figure BDA00037869933800000510
each of
Figure BDA00037869933800000511
Transformation; then, the database DB transforms the authentication query Q A received from the extractor, and the transformation formula is as follows:

Figure BDA00037869933800000512
Figure BDA00037869933800000512

Figure BDA00037869933800000513
Figure BDA00037869933800000513

(2)数据库DB计算变换后的查询

Figure BDA00037869933800000514
和在索引I中的每一个加密项
Figure BDA00037869933800000515
的相关性分数,计算公式如下:(2) Database DB calculates the transformed query
Figure BDA00037869933800000514
and every encrypted item in index I
Figure BDA00037869933800000515
The correlation score of is calculated as follows:

Figure BDA00037869933800000516
Figure BDA00037869933800000516

Figure BDA0003786993380000061
Figure BDA0003786993380000061

其中

Figure BDA0003786993380000062
是相似性分数的随机数部分,消除
Figure BDA00037869933800000616
Figure BDA00037869933800000617
这两部分以获得上式的计算结果;in
Figure BDA0003786993380000062
is the random number part of the similarity score, eliminating
Figure BDA00037869933800000616
and
Figure BDA00037869933800000617
These two parts are used to obtain the calculation result of the above formula;

根据计算结果,数据库DB获得最接近的k个索引条目,将其相应的生物特征模板集合发送给计算服务器CS,计算服务器CS将计算密文模板

Figure BDA0003786993380000063
和k个候选模板之间的欧几里德距离;According to the calculation result, the database DB obtains the closest k index entries, and sends its corresponding biometric template set to the calculation server CS, and the calculation server CS will calculate the ciphertext template
Figure BDA0003786993380000063
and the Euclidean distance between k candidate templates;

(3)计算服务器CS使用认证用户Ui的对称密钥

Figure BDA0003786993380000064
对密文EK(TA)进行解密,以获取生物特征模版
Figure BDA0003786993380000065
然后,计算
Figure BDA0003786993380000066
和候选模板
Figure BDA0003786993380000067
之间的欧几里德距离,计算公式如下:(3) The computing server CS uses the symmetric key of the authenticated user U i
Figure BDA0003786993380000064
Decrypt the ciphertext E K (T A ) to obtain the biometric template
Figure BDA0003786993380000065
Then, calculate
Figure BDA0003786993380000066
and candidate templates
Figure BDA0003786993380000067
The Euclidean distance between is calculated as follows:

Figure BDA0003786993380000068
Figure BDA0003786993380000068

如果上式中的欧几里德距离是在同态加密算法Paillier下根据其加法同态计算的,那么计算结果如下:If the Euclidean distance in the above formula is calculated according to its additive homomorphism under the homomorphic encryption algorithm Paillier, then the calculation result is as follows:

Figure BDA0003786993380000069
Figure BDA0003786993380000069

对于

Figure BDA00037869933800000610
Figure BDA00037869933800000611
这两部分,利用加法同态将其转换为下面的式子,转换公式如下:for
Figure BDA00037869933800000610
and
Figure BDA00037869933800000611
These two parts are converted into the following formula by using additive homomorphism, and the conversion formula is as follows:

Figure BDA00037869933800000612
Figure BDA00037869933800000612

Figure BDA00037869933800000613
Figure BDA00037869933800000613

对于

Figure BDA00037869933800000614
这部分,利用加法同态将其转换为下面的式子,转换公式如下:for
Figure BDA00037869933800000614
In this part, use additive homomorphism to convert it into the following formula, and the conversion formula is as follows:

Figure BDA00037869933800000615
Figure BDA00037869933800000615

计算服务器CS将

Figure BDA0003786993380000071
进行转换,转换公式如下:Compute Server CS will
Figure BDA0003786993380000071
To convert, the conversion formula is as follows:

Figure BDA0003786993380000072
Figure BDA0003786993380000072

在计算服务器CS具有明文、密文模板TA

Figure BDA0003786993380000073
和加密的候选模板集合的前提下,计算服务器CS检查密文模板
Figure BDA0003786993380000074
和每个候选模板的欧几里德距离,结果中的最小欧几里德距离
Figure BDA0003786993380000075
是否满足设置的阈值T;如果小于设置的阈值T,计算服务器CS认为认证通过;否则,计算服务器CS认为认证失败。There is plaintext and ciphertext template T A in computing server CS,
Figure BDA0003786993380000073
and the encrypted candidate template set, the computing server CS checks the ciphertext template
Figure BDA0003786993380000074
The Euclidean distance to each candidate template, the minimum Euclidean distance in the result
Figure BDA0003786993380000075
Whether it satisfies the set threshold T; if it is less than the set threshold T, the computing server CS considers the authentication passed; otherwise, the computing server CS considers the authentication failed.

特征更新阶段包括:The feature update phase includes:

系统支持三种更新操作:添加、删除和修改,即新用户注册、现有用户撤销和基于可取消模板模块的现有用户密钥和特征模板的更新,具体过程如下:The system supports three update operations: add, delete, and modify, namely new user registration, existing user revocation, and update of existing user keys and feature templates based on cancelable template modules. The specific process is as follows:

(1)新用户UADD通过提取器上传自己的生物特征数据,提取器对生物特征数据进行处理,分别生成加密的注册向量

Figure BDA0003786993380000076
和加密的特征模板
Figure BDA0003786993380000077
提取器将
Figure BDA0003786993380000078
发送到计算服务器CS,计算服务器CS将其发送到数据库DB,数据库DB将
Figure BDA0003786993380000079
添加到存储的索引中以完成新用户的注册;(1) The new user U ADD uploads his biometric data through the extractor, and the extractor processes the biometric data to generate encrypted registration vectors respectively
Figure BDA0003786993380000076
and the encrypted feature template
Figure BDA0003786993380000077
The extractor will
Figure BDA0003786993380000078
to the calculation server CS, the calculation server CS sends it to the database DB, and the database DB will
Figure BDA0003786993380000079
added to the stored index to complete the registration of a new user;

(2)现有用户撤销过程需要三个操作;首先,提取器收集并提取待撤销用户UDEL的生物特征;此外,提取器利用注册密钥

Figure BDA00037869933800000710
生成匹配索引条目
Figure BDA00037869933800000711
然后,提取器将索引条目
Figure BDA00037869933800000712
发送给计算服务器CS,计算服务器CS将其发送到数据库DB;最后,数据库DB在其存储的索引上删除索引条目
Figure BDA00037869933800000713
和匹配的加密模板
Figure BDA00037869933800000714
(2) The existing user revocation process requires three operations; first, the extractor collects and extracts the biometrics of the user U DEL to be revoked; in addition, the extractor utilizes the registration key
Figure BDA00037869933800000710
generate matching index entries
Figure BDA00037869933800000711
The extractor will then index the entry
Figure BDA00037869933800000712
Sent to Compute Server CS, Compute Server CS sends it to Database DB; Finally, Database DB deletes the index entry on the index it stores
Figure BDA00037869933800000713
and the matching encryption template
Figure BDA00037869933800000714

(3)当用户Ui的生物模板损坏或被盗时,用户Ui基于可取消模板模块重新输入生物特征;首先,提取器提取用户生物特征并获得注册索引项

Figure BDA00037869933800000715
和加密模板
Figure BDA00037869933800000716
此外,提取器生成新的注册和模板密钥
Figure BDA00037869933800000717
Figure BDA00037869933800000718
然后,提取器将
Figure BDA00037869933800000719
Figure BDA00037869933800000720
发送给计算服务器CS,计算服务器CS将其发送到数据库DB;最后,数据库DB利用索引项
Figure BDA00037869933800000721
去匹配加密索引I中与用户Ui相关的索引项
Figure BDA00037869933800000722
删除索引项
Figure BDA00037869933800000723
和相关的加密模板
Figure BDA00037869933800000724
并将
Figure BDA00037869933800000725
Figure BDA00037869933800000726
插入到加密索引I中,(3) When the biological template of user U i is damaged or stolen, user U i re-enters the biometric feature based on the cancelable template module; first, the extractor extracts the user biometric feature and obtains the registration index item
Figure BDA00037869933800000715
and encrypted template
Figure BDA00037869933800000716
Additionally, the extractor generates new registration and template keys
Figure BDA00037869933800000717
and
Figure BDA00037869933800000718
Then, the extractor will
Figure BDA00037869933800000719
and
Figure BDA00037869933800000720
Sent to the computing server CS, the computing server CS sends it to the database DB; finally, the database DB utilizes the index item
Figure BDA00037869933800000721
To match the index items related to user U i in encrypted index I
Figure BDA00037869933800000722
delete index entry
Figure BDA00037869933800000723
and associated encryption templates
Figure BDA00037869933800000724
and will
Figure BDA00037869933800000725
and
Figure BDA00037869933800000726
Inserted into encrypted index I,

其中,TA:可信中心;CS:计算服务器;DB:数据库;Ui、Uj:认证用户;

Figure BDA0003786993380000081
认证用户Ui的公钥;
Figure BDA0003786993380000082
认证用户Ui的私钥;
Figure BDA0003786993380000083
认证用户Ui的对称加密密钥;
Figure BDA0003786993380000084
认证密钥;Ri:注册用户;
Figure BDA0003786993380000085
索引构建密钥;vB:生物特征模板;vR:生物特征注册向量;Ti:候选模板;Paillier:一种同态加密算法;
Figure BDA0003786993380000086
注册向量;
Figure BDA0003786993380000087
扩展后的注册向量;I:加密索引;vA:特征向量;v′A:扩展后的特征向量;TA:生物特征模版;QA:认证查询;
Figure BDA0003786993380000088
欧几里德距离;AES:一种对称加密算法;M:随机可逆矩阵;M-1:M的逆矩阵;m1、m2:随机数;v″i:特征候选向量;
Figure BDA0003786993380000089
注册用户Ri的注册密钥;
Figure BDA00037869933800000810
模板密钥;
Figure BDA00037869933800000811
生物特征模板Ti的加密形式;
Figure BDA00037869933800000812
注册向量
Figure BDA00037869933800000813
的加密形式;Umax:数据库DB中的用户总数;
Figure BDA00037869933800000814
生物特征模版TA的同态加密形式;EK(TA):生物特征模版TA的对称加密形式;
Figure BDA00037869933800000815
认证用户Uj的对称密钥;
Figure BDA00037869933800000816
变换后的查询;UADD:新用户;
Figure BDA00037869933800000817
新用户UADD加密的注册向量;
Figure BDA00037869933800000818
新用户UADD加密的特征模板;UDEL:待撤销用户;
Figure BDA00037869933800000819
待撤销用户UDEL的注册密钥;
Figure BDA00037869933800000820
与待撤销用户UDEL匹配的索引条目;
Figure BDA00037869933800000821
与待撤销用户UDEL匹配的加密模板;
Figure BDA00037869933800000822
用户Ui新的注册索引项;
Figure BDA00037869933800000823
用户Ui新的加密模板;
Figure BDA00037869933800000824
用户Ui新的注册密钥;
Figure BDA00037869933800000825
用户Ui新的模板密钥;
Figure BDA00037869933800000826
新定义的向量运算;||:字符串连接操作;∑:累加运算;Π:连乘运算。Among them, TA: trusted center; CS: computing server; DB: database; U i , U j : authenticated users;
Figure BDA0003786993380000081
Authenticating the public key of user U i ;
Figure BDA0003786993380000082
Authenticating the private key of user U i ;
Figure BDA0003786993380000083
symmetric encryption key for authenticating user U i ;
Figure BDA0003786993380000084
Authentication key; R i : registered user;
Figure BDA0003786993380000085
Index construction key; v B : biometric template; v R : biometric registration vector; T i : candidate template; Paillier: a homomorphic encryption algorithm;
Figure BDA0003786993380000086
registration vector;
Figure BDA0003786993380000087
Extended registration vector; I: encrypted index; v A : feature vector; v′ A : extended feature vector; T A : biometric template; Q A : authentication query;
Figure BDA0003786993380000088
Euclidean distance; AES: a symmetric encryption algorithm; M: random reversible matrix; M -1 : the inverse matrix of M; m 1 , m 2 : random numbers; v″ i : feature candidate vector;
Figure BDA0003786993380000089
Registration key of registered user R i ;
Figure BDA00037869933800000810
template key;
Figure BDA00037869933800000811
An encrypted form of the biometric template T i ;
Figure BDA00037869933800000812
registration vector
Figure BDA00037869933800000813
encrypted form; U max : the total number of users in the database DB;
Figure BDA00037869933800000814
The homomorphic encryption form of the biometric template T A ; E K (T A ): the symmetric encryption form of the biometric template T A ;
Figure BDA00037869933800000815
symmetric key for authenticating user U j ;
Figure BDA00037869933800000816
Transformed query; U ADD : new user;
Figure BDA00037869933800000817
New user U ADD encrypted registration vector;
Figure BDA00037869933800000818
Feature template encrypted by new user U ADD ; U DEL : user to be revoked;
Figure BDA00037869933800000819
The registration key of the user U DEL to be revoked;
Figure BDA00037869933800000820
Index entries matching the user U DEL to be revoked;
Figure BDA00037869933800000821
The encryption template matching the user U DEL to be revoked;
Figure BDA00037869933800000822
User U i 's new registration index item;
Figure BDA00037869933800000823
User U i 's new encryption template;
Figure BDA00037869933800000824
User U i new registration key;
Figure BDA00037869933800000825
User U i new template key;
Figure BDA00037869933800000826
Newly defined vector operations; ||: string concatenation operation; ∑: accumulation operation; Π: multiplication operation.

基于联合生物识别的轻量级生物认证方法通过一种接收用户输入程序存储介质存储,通过计算机程序使电子设备执行。The lightweight biometric authentication method based on combined biometrics is stored in a program storage medium that receives user input, and is executed by electronic equipment through a computer program.

基于联合生物识别的轻量级生物认证方法采用轻量级生物认证系统实现,轻量级生物认证系统包括:The lightweight biometric authentication method based on joint biometrics is implemented using a lightweight biometric authentication system, which includes:

提取器,用于提取生物特征,生成可取消模板模块,加密模板;An extractor for extracting biometrics, generating cancelable template modules, and encrypting templates;

可信中心,用于生成密钥;a trusted center for generating keys;

计算服务器,用于加密生物特征的欧几里德距离计算;Calculation server for Euclidean distance calculation of encrypted biometric features;

数据库,用于对索引进行存储。Database for storing indexes.

所述的轻量级生物认证系统搭载于终端,终端为物联网终端。The lightweight biometric authentication system is carried on a terminal, and the terminal is an Internet of Things terminal.

本发明的有益效果为:本发明使用新提出的随机位生成RBG和加密过程来构造生物特征模板和相关索引,可以保护外包存储的生物特征模板的隐私和身份认证过程的机密性;在提取器提取认证模板后,利用随机位生成RBG和矩阵密钥对模板进行混淆和加密以获得令牌,可以确保整个认证过程的安全性和查询的不可连接性;认证匹配过程,筛选出靠近令牌的匹配集,然后逐个比较认证模板和匹配集中模板之间的相似性,基于新提出的加密向量距离计算方法执行相似性计算,这样认证过程具有很强的鲁棒性,可以确保认证的准确性;所以本发明的方法以更小的成本达到更高的安全性和准确性。The beneficial effects of the present invention are: the present invention uses the newly proposed random bit to generate RBG and encryption process to construct biometric templates and related indexes, which can protect the privacy of outsourced stored biometric templates and the confidentiality of the identity authentication process; After extracting the authentication template, use random bits to generate RBG and matrix keys to confuse and encrypt the template to obtain a token, which can ensure the security of the entire authentication process and the incompatibility of the query; the authentication matching process screens out the tokens that are close to the token Matching set, and then compare the similarity between the authentication template and the template in the matching set one by one, and perform similarity calculation based on the newly proposed encrypted vector distance calculation method, so that the authentication process is very robust and can ensure the accuracy of authentication; Therefore, the method of the present invention achieves higher safety and accuracy at a lower cost.

本发明采用基于低开销的加密过程和随机位生成来构造生物特征模板和相关索引,用户将从随机位生成获取密钥作为身份认证密码,这是后续实现联合知识和生物特征身份认证的基础;在提取器提取认证模板后,利用随机位生成和矩阵密钥对模板进行混淆和加密以获得令牌,使用可搜索加密技术设计了一种基于令牌和加密索引的检索方法,检索k个最接近认证模板的模板索引,可以确保整个认证过程的安全性和查询的不可连接性;本发明提出了一种结合人脸和指纹的生物特征模板构建方法,该方法使用局部二值特征LBP和基于细节的指纹特征,认证过程中筛选出靠近令牌的匹配集,然后逐个比较认证模板和匹配集中模板之间的相似性,基于新提出的加密向量距离计算方法执行相似性计算,这样认证过程具有很强的鲁棒性,可以确保认证的准确性。本发明满足生物特征识别中模板的机密性、可更新性、可撤销性、不可逆性和不可连接性,实现了生物特征低成本和识别高安全性需求之间的均衡。The present invention adopts low-overhead-based encryption process and random bit generation to construct biometric templates and related indexes, and users will generate and obtain keys from random bits as identity authentication passwords, which is the basis for subsequent realization of joint knowledge and biometric identity authentication; After the extractor extracts the authentication template, it uses random bit generation and matrix key to confuse and encrypt the template to obtain tokens, and uses searchable encryption technology to design a retrieval method based on tokens and encrypted indexes to retrieve the k most The template index close to the authentication template can ensure the security of the entire authentication process and the non-connectability of the query; the present invention proposes a biometric template construction method combining face and fingerprint, which uses local binary features LBP and based on The fingerprint characteristics of the details, the matching set close to the token is screened out during the authentication process, and then the similarity between the authentication template and the template in the matching set is compared one by one, and the similarity calculation is performed based on the newly proposed encryption vector distance calculation method, so that the authentication process has Strong robustness can ensure the accuracy of authentication. The invention satisfies the confidentiality, renewability, revocability, irreversibility and non-connectability of templates in biological feature identification, and realizes the balance between low cost of biological features and high identification security requirements.

本发明与经典的生物认证方法进行对比分析。安全性对比结果如表1所示,其中“√”表示满足该项安全需求,“×”表示不满足该项安全需求,“*”表示部分满足该项安全需求。The present invention is compared and analyzed with the classical biometric authentication method. The security comparison results are shown in Table 1, where "√" indicates that the security requirement is met, "×" indicates that the security requirement is not met, and "*" indicates that the security requirement is partially met.

表1安全性对比Table 1 Security comparison

Figure BDA0003786993380000091
Figure BDA0003786993380000091

Figure BDA0003786993380000101
Figure BDA0003786993380000101

在表1中,本发明方法具有其他经典的生物认证方法没有的可更新性和可撤销性;Zhu等人的方法具有可验证性和抗共谋性,但由于在方法中引入了双线性配对,这不可避免地会产生较高的系统开销,使得该方法不适用于移动设备。本发明方法实现了生物认证低成本和高安全性需求之间的均衡。In Table 1, the method of the present invention has renewability and revocability that other classical biometric authentication methods do not have; the method of Zhu et al. has verifiability and collusion resistance, but due to the introduction of bilinear pairing, which inevitably produces high system overhead, making this method unsuitable for mobile devices. The method of the invention realizes the balance between low cost of biometric authentication and high security requirements.

附图说明Description of drawings

图1是本发明实施例轻量级生物认证方法流程图。Fig. 1 is a flowchart of a lightweight biometric authentication method according to an embodiment of the present invention.

图2是本发明实施例轻量级生物认证系统的系统框架图。Fig. 2 is a system frame diagram of a lightweight biometric authentication system according to an embodiment of the present invention.

图3是本发明实施例轻量级生物认证方法的实现流程图。Fig. 3 is a flow chart of implementing a lightweight biometric authentication method according to an embodiment of the present invention.

图4、图5和图6是本发明实施例轻量级生物认证方法与其他经典的生物认证方法在不同数据库(ORL、Yale和FERET数据库)中的认证准确率和认证时间对比图。Fig. 4, Fig. 5 and Fig. 6 are comparison charts of authentication accuracy and authentication time in different databases (ORL, Yale and FERET databases) between the lightweight biometric authentication method of the embodiment of the present invention and other classic biometric authentication methods.

图7、图8和图9是本发明实施例轻量级生物认证方法中LBP特征描述子的维度在不同数据库(ORL、Yale和FERET数据库)下对不同数据量的认证准确率的仿真图。Fig. 7, Fig. 8 and Fig. 9 are the simulation diagrams of the authentication accuracy of the LBP feature descriptor dimension in different databases (ORL, Yale and FERET databases) for different data volumes in the lightweight biometric authentication method of the embodiment of the present invention.

图10是本发明实施例轻量级生物认证方法与其他经典的生物认证方法在不同特征向量大小下生成密钥和生成令牌的时间开销对比图。Fig. 10 is a comparison diagram of the time cost of key generation and token generation in the light-weight biometric authentication method of the embodiment of the present invention and other classic biometric authentication methods under different feature vector sizes.

图11是本发明实施例轻量级生物认证方法与其他经典的生物认证方法在FERET数据库中索引构建的时间开销对比图。Fig. 11 is a comparison diagram of the time cost of index construction in the FERET database between the lightweight biometric authentication method and other classic biometric authentication methods according to the embodiment of the present invention.

图12是本发明实施例轻量级生物认证方法与其他经典的生物认证方法在FERET数据库中查询的时间开销对比图。Fig. 12 is a comparison diagram of the time cost of querying in the FERET database between the lightweight biometric authentication method and other classic biometric authentication methods according to the embodiment of the present invention.

图13、图14和图15是本发明实施例轻量级生物认证方法与其他经典的生物认证方法在不同向量大小和数据量下加密向量计算的时间开销对比图。Fig. 13, Fig. 14 and Fig. 15 are comparison diagrams of the time cost of encryption vector calculation between the lightweight biometric authentication method of the embodiment of the present invention and other classic biometric authentication methods under different vector sizes and data volumes.

具体实施方式Detailed ways

以下结合实施例和附图对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。The present invention will be described in further detail below in conjunction with the embodiments and accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

如图1所示,一种基于联合生物识别的轻量级生物认证方法,包括以下步骤:As shown in Figure 1, a lightweight biometric authentication method based on joint biometrics includes the following steps:

S101:可信中心TA生成一系列密钥,为认证用户Ui生成公钥

Figure BDA0003786993380000111
私钥
Figure BDA0003786993380000112
对称加密密钥
Figure BDA0003786993380000113
和认证密钥
Figure BDA0003786993380000114
为注册用户Ri生成索引构建密钥
Figure BDA0003786993380000115
S101: The trusted center TA generates a series of keys, and generates a public key for the authenticated user U i
Figure BDA0003786993380000111
private key
Figure BDA0003786993380000112
Symmetric encryption key
Figure BDA0003786993380000113
and authentication key
Figure BDA0003786993380000114
Generate an index build key for registered user R i
Figure BDA0003786993380000115

S102:提取器通过混淆生物特征模板vB来构造d维生物特征注册向量vR和生物特征模板Ti,并使用同态加密算法Paillier的公钥加密生物特征模板TiS102: The extractor constructs a d-dimensional biometric registration vector v R and a biometric template T i by confusing the biometric template v B , and encrypts the biometric template T i using the homomorphic encryption algorithm Paillier's public key;

S103:提取器扩展注册向量

Figure BDA0003786993380000116
Figure BDA0003786993380000117
使用注册密钥
Figure BDA0003786993380000118
加密
Figure BDA0003786993380000119
Figure BDA00037869933800001110
发送给计算服务器CS,计算服务器CS加密索引I并发送给数据库DB;S103: Extractor extension registration vector
Figure BDA0003786993380000116
arrive
Figure BDA0003786993380000117
use registration key
Figure BDA0003786993380000118
encryption
Figure BDA0003786993380000119
Will
Figure BDA00037869933800001110
Send to the calculation server CS, the calculation server CS encrypts the index I and sends it to the database DB;

S104:提取器扩展特征向量vA到v′A,对扩展的特征向量v′A和生物特征模版TA进行加密,并将

Figure BDA00037869933800001111
和EK(TA)发送给计算服务器CS;S104: The extractor expands the feature vector v A to v′ A , encrypts the extended feature vector v′ A and the biometric template T A , and
Figure BDA00037869933800001111
and E K (T A ) are sent to the computing server CS;

S105:数据库DB对接收到的加密索引I和认证查询QA进行变换,计算每个注册模板和认证查询QA之间的相似性,将候选模板集合发送给计算服务器CS,以便计算服务器CS计算欧几里德距离

Figure BDA00037869933800001112
S105: The database DB transforms the received encrypted index I and the authentication query Q A , calculates the similarity between each registration template and the authentication query Q A , and sends the set of candidate templates to the calculation server CS, so that the calculation server CS can calculate Euclidean distance
Figure BDA00037869933800001112

S106:支持三种更新操作:添加、删除和修改,即新用户注册、现有用户撤销和基于可取消模板模块的现有用户密钥和特征模板的更新。S106: Support three update operations: add, delete and modify, ie new user registration, existing user revocation, and update of existing user keys and feature templates based on cancelable template modules.

如图2所示,所述基于联合生物识别的轻量级生物认证方法采用轻量级生物认证系统实现,轻量级生物认证系统包括:As shown in Figure 2, the lightweight biometric authentication method based on joint biometrics is implemented using a lightweight biometric authentication system, and the lightweight biometric authentication system includes:

提取器:作为系统中完全受信任的实体,提取器具有足够的计算能力,但没有大的存储空间,它主要负责提取生物特征,和可信中心一起生成多模式可取消模板,并根据可信中心分配的密钥加密模板;Extractor: As a fully trusted entity in the system, the extractor has sufficient computing power but does not have a large storage space. It is mainly responsible for extracting biometric features, generating multi-mode cancelable templates together with the trusted center, and according to the trusted Key encryption template assigned by the center;

可信中心:负责协助提取器生成多模式可取消模板,并为不同的用户生成不同的模板加密密钥;Trusted center: responsible for assisting the extractor in generating multi-mode cancelable templates, and generating different template encryption keys for different users;

计算服务器:系统中有多个可信的计算服务器,每个计算服务器使用强大的计算能力为系统子区域中的所有用户提供服务,计算服务器负责加密生物特征的欧几里德距离计算,并根据候选模板集和认证模板之间的计算结果返回最终认证结果;Computing server: There are multiple trusted computing servers in the system. Each computing server uses powerful computing power to provide services for all users in the system sub-area. The computing server is responsible for the Euclidean distance calculation of encrypted biometrics, and according to The calculation result between the candidate template set and the authentication template returns the final authentication result;

数据库:作为系统中具有最强计算能力和存储空间的实体,分布式数据库可以存储多个用户的生物特征模板,并通过建立加密的查询索引来关联用户身份和特征模板;数据库是一个半可信实体,将全面执行指令并对存储信息进行统计分析。Database: As the entity with the strongest computing power and storage space in the system, the distributed database can store the biometric templates of multiple users, and associate user identities and feature templates by establishing encrypted query indexes; the database is a semi-trusted Entities that will fully execute instructions and perform statistical analysis on stored information.

如图3所示,所述的基于联合生物识别的轻量级生物认证方法包括生成密钥阶段、加密特征阶段、生成索引阶段、生成令牌阶段、认证阶段和特征更新阶段;As shown in Figure 3, the described lightweight biometric authentication method based on joint biometrics includes a key generation phase, an encryption feature phase, an index generation phase, a token generation phase, an authentication phase and a feature update phase;

生成密钥阶段包括:The key generation phase includes:

(1)可信中心TA为用户Ui生成两个大素数p、q,并基于同态加密算法Paillier生成公钥

Figure BDA0003786993380000121
其中n=pq,g是小于n2的随机数;私钥
Figure BDA0003786993380000122
其中α=lcm(p-1,q-1),
Figure BDA0003786993380000123
此外,可信中心TA为认证用户Ui基于对称加密算法AES生成对称加密密钥
Figure BDA00037869933800001210
(1) The trusted center TA generates two large prime numbers p and q for the user U i , and generates a public key based on the homomorphic encryption algorithm Paillier
Figure BDA0003786993380000121
Where n=pq, g is a random number less than n 2 ; the private key
Figure BDA0003786993380000122
where α = lcm(p-1, q-1),
Figure BDA0003786993380000123
In addition, the trusted center TA generates a symmetric encryption key for the authenticated user U i based on the symmetric encryption algorithm AES
Figure BDA00037869933800001210

(2)首先,可信中心TA为认证用户Ui生成一个随机可逆矩阵及其逆矩阵M,M-1∈Z2d ×2d,其中d是特征向量的维数;然后,对于每个认证用户Ui,可信中心TA生成两个随机矩阵

Figure BDA0003786993380000124
作为认证密钥,其中
Figure BDA0003786993380000125
最后,对于每个注册用户Ri,可信中心TA生成两个随机矩阵
Figure BDA0003786993380000126
作为索引构建密钥,其中
Figure BDA0003786993380000127
(2) First, the trusted center TA generates a random reversible matrix and its inverse matrix M for the authenticated user U i , M -1 ∈ Z 2d ×2d , where d is the dimension of the feature vector; then, for each authenticated user U i , the trusted center TA generates two random matrices
Figure BDA0003786993380000124
As an authentication key, where
Figure BDA0003786993380000125
Finally, for each registered user R i , the trusted center TA generates two random matrices
Figure BDA0003786993380000126
As an index build key, where
Figure BDA0003786993380000127

加密特征阶段包括:The encryption feature phase includes:

(1)通过人脸和指纹特征提取,可以获得N个M维向量

Figure BDA0003786993380000128
和一个n维向量vf;定义操作
Figure BDA0003786993380000129
计算公式如下:(1) Through face and fingerprint feature extraction, N M-dimensional vectors can be obtained
Figure BDA0003786993380000128
and an n-dimensional vector v f ; define the operation
Figure BDA0003786993380000129
Calculated as follows:

Figure BDA0003786993380000131
Figure BDA0003786993380000131

获得的混淆生物特征模板如下:The obfuscated biometric template obtained is as follows:

Figure BDA0003786993380000132
Figure BDA0003786993380000132

(2)提取器首先在vB的每个向量中随机选择m1(m1∈M)个数字,获取每个向量中相关下标的数据来构造特征候选向量v″i(i=1,…,N),随机生成的下标定义为用户的注册密钥

Figure BDA0003786993380000133
提取器基于“字符串连接”操作连接特征候选向量来构建d维生物特征注册向量,计算公式如下:(2) The extractor first randomly selects m 1 (m 1 ∈ M) numbers in each vector of v B , obtains the relevant subscript data in each vector to construct the feature candidate vector v″ i (i=1,… , N), the randomly generated subscript is defined as the user's registration key
Figure BDA0003786993380000133
The extractor constructs a d-dimensional biometric registration vector by concatenating feature candidate vectors based on the "string concatenation" operation, and the calculation formula is as follows:

vR=v″1||v″2||…||v″N v R =v″ 1 ||v″ 2 ||…||v″ N

(3)提取器在vB的每个向量中随机选择m2(m2∈M)个数字,随机生成的下标定义为用户的模板密钥

Figure BDA00037869933800001319
获取每个向量中相关下标的数据来构造生物特征模板Ti,计算公式如下:(3) The extractor randomly selects m 2 (m 2 ∈ M) numbers in each vector of v B , and the randomly generated subscript is defined as the template key of the user
Figure BDA00037869933800001319
Obtain the relevant subscript data in each vector to construct the biometric template T i , the calculation formula is as follows:

Figure BDA0003786993380000134
Figure BDA0003786993380000134

(4)提取器使用同态加密算法Paillier的公钥加密生物特征模板Ti,加密公式如下:(4) The extractor uses the homomorphic encryption algorithm Paillier's public key to encrypt the biometric template T i , and the encryption formula is as follows:

Figure BDA0003786993380000135
Figure BDA0003786993380000135

生成索引阶段包括:The build index phase includes:

(1)首先,提取器扩展每个注册向量

Figure BDA0003786993380000136
Figure BDA0003786993380000137
扩展公式如下:(1) First, the extractor expands each registration vector
Figure BDA0003786993380000136
arrive
Figure BDA0003786993380000137
The expansion formula is as follows:

Figure BDA0003786993380000138
Figure BDA0003786993380000138

其中

Figure BDA0003786993380000139
是提取器为每个注册向量
Figure BDA00037869933800001310
随机选择的数字;in
Figure BDA0003786993380000139
is the extractor for each registration vector
Figure BDA00037869933800001310
randomly selected numbers;

(2)然后,提取器使用注册密钥

Figure BDA00037869933800001311
加密
Figure BDA00037869933800001312
加密公式如下:(2) Then, the extractor uses the registration key
Figure BDA00037869933800001311
encryption
Figure BDA00037869933800001312
The encryption formula is as follows:

Figure BDA00037869933800001313
Figure BDA00037869933800001313

其中,

Figure BDA00037869933800001314
p1>>p2并且γ>>2|max(εi)|,
Figure BDA00037869933800001315
定义为从概率分布中随机选择的整数混淆向量;在随后的认证阶段中,上述参数将用于向量相似性计算;
Figure BDA00037869933800001316
是由注册向量
Figure BDA00037869933800001317
组成的密文;提取器以元组
Figure BDA00037869933800001318
的形式将
Figure BDA0003786993380000141
Figure BDA0003786993380000142
从注册用户Ri传输给计算服务器CS;当计算服务器CS收到所有注册用户的加密元祖时,将创建加密索引
Figure BDA0003786993380000143
其中Umax表示数据库DB中的用户总数;加密索引I将由计算服务器CS传输到数据库DB中进行存储。in,
Figure BDA00037869933800001314
p 1 >>p 2 and γ>>2|max(ε i )|,
Figure BDA00037869933800001315
Defined as an integer confusion vector randomly selected from a probability distribution; in the subsequent authentication phase, the above parameters will be used for vector similarity calculations;
Figure BDA00037869933800001316
is given by the registration vector
Figure BDA00037869933800001317
The composed ciphertext; the extractor takes the tuple
Figure BDA00037869933800001318
in the form of
Figure BDA0003786993380000141
and
Figure BDA0003786993380000142
Transmitted from registered user R i to computing server CS; when computing server CS receives encrypted tuples of all registered users, an encrypted index will be created
Figure BDA0003786993380000143
Where U max represents the total number of users in the database DB; the encrypted index I will be transmitted by the computing server CS to the database DB for storage.

生成令牌阶段包括:The token generation phase includes:

(1)首先,提取器从认证用户Uj的生物特征中提取特征向量vA和具有注册密钥

Figure BDA0003786993380000144
和模板密钥
Figure BDA0003786993380000145
的生物特征模板TA;(1) First, the extractor extracts the feature vector v A from the biometric feature of the authenticated user U j and has the registration key
Figure BDA0003786993380000144
and the template key
Figure BDA0003786993380000145
biometric template T A ;

(2)然后,提取器扩展特征向量vA到v′A,扩展公式如下:(2) Then, the extractor expands the feature vector v A to v′ A , and the expansion formula is as follows:

Figure BDA0003786993380000146
Figure BDA0003786993380000146

其中

Figure BDA0003786993380000147
是提取器为认证用户Uj的认证查询随机选择的数字,需要注意ηj是正数;in
Figure BDA0003786993380000147
is the number randomly selected by the extractor for the authentication query of the authenticated user U j , it should be noted that η j is a positive number;

(3)接着,提取器使用认证用户Uj的认证密钥

Figure BDA0003786993380000148
对扩展向量v′A进行加密,加密公式如下:(3) Next, the extractor uses the authentication key of the authenticated user U j
Figure BDA0003786993380000148
Encrypt the extended vector v′ A , the encryption formula is as follows:

Figure BDA0003786993380000149
Figure BDA0003786993380000149

其中

Figure BDA00037869933800001410
是由提取器随机选择的整数混淆向量;提取器将加密的认证查询QA发送给计算服务器CS,然后再将认证查询QA发送给数据库DB进行认证;in
Figure BDA00037869933800001410
is an integer confusion vector randomly selected by the extractor; the extractor sends the encrypted authentication query Q A to the computing server CS, and then sends the authentication query Q A to the database DB for authentication;

(4)提取器使用认证用户Uj的同态加密算法Paillier的公钥

Figure BDA00037869933800001411
对生物特征模版TA进行加密以获得密文
Figure BDA00037869933800001412
除此之外,提取器使用认证用户Uj的对称密钥
Figure BDA00037869933800001413
对生物特征模版TA进行加密以获得密文EK(TA);提取器将
Figure BDA00037869933800001414
和EK(TA)发送给计算服务器CS,用于后续密文的欧几里德距离计算。(4) The extractor uses the public key of the homomorphic encryption algorithm Paillier of the authenticated user U j
Figure BDA00037869933800001411
Encrypt the biometric template T A to obtain the ciphertext
Figure BDA00037869933800001412
Among other things, the extractor authenticates the user U j using the symmetric key
Figure BDA00037869933800001413
Encrypt the biometric template T A to obtain the ciphertext E K (T A ); the extractor will
Figure BDA00037869933800001414
and E K (T A ) are sent to the computing server CS for Euclidean distance calculation of subsequent ciphertexts.

认证阶段包括:The certification phase includes:

认证过程包括三个步骤:首先,数据库DB对接收到的索引I和认证查询QA进行变换;然后,数据库DB根据其存储的加密索引

Figure BDA00037869933800001415
计算每个注册模板和认证查询QA之间的相似性;最后,数据库DB将候选模板集合发送给计算服务器CS,以便计算服务器CS使用与候选集和密文
Figure BDA00037869933800001416
相关的特征模板去计算两者之间的欧几里德距离;具体过程如下:The authentication process includes three steps: first, the database DB transforms the received index I and the authentication query Q A ; then, the database DB transforms the received index I according to the encrypted index
Figure BDA00037869933800001415
Calculate the similarity between each registration template and the authentication query Q A ; finally, the database DB sends the set of candidate templates to the calculation server CS, so that the calculation server CS uses the candidate set and the ciphertext
Figure BDA00037869933800001416
Related feature templates to calculate the Euclidean distance between the two; the specific process is as follows:

(1)数据库DB对从提取器接收到的加密索引

Figure BDA0003786993380000151
中的每一个
Figure BDA0003786993380000152
进行变换;然后,数据库DB再对从提取器接收到的认证查询QA进行变换,变换公式如下:(1) The database DB pairs the encrypted index received from the extractor
Figure BDA0003786993380000151
each of
Figure BDA0003786993380000152
Transformation; then, the database DB transforms the authentication query Q A received from the extractor, and the transformation formula is as follows:

Figure BDA0003786993380000153
Figure BDA0003786993380000153

Figure BDA0003786993380000154
Figure BDA0003786993380000154

(2)数据库DB计算变换后的查询

Figure BDA0003786993380000155
和在加密索引I中的每一个加密项
Figure BDA0003786993380000156
的相关性分数,计算公式如下:(2) Database DB calculates the transformed query
Figure BDA0003786993380000155
and each encrypted item in the encrypted index I
Figure BDA0003786993380000156
The correlation score of is calculated as follows:

Figure BDA0003786993380000157
Figure BDA0003786993380000157

其中

Figure BDA0003786993380000158
是相似性分数的随机数部分,需要注意的是由于p1>>p2
Figure BDA0003786993380000159
所以
Figure BDA00037869933800001510
Figure BDA00037869933800001511
这两部分的值无限趋近于0;由于计算结果在域
Figure BDA00037869933800001512
上四舍五入,因此可以消除
Figure BDA00037869933800001513
Figure BDA00037869933800001514
这两部分以获得上式的计算结果;in
Figure BDA0003786993380000158
is the random number part of the similarity score, it should be noted that since p 1 >>p 2 and
Figure BDA0003786993380000159
so
Figure BDA00037869933800001510
and
Figure BDA00037869933800001511
The values of these two parts are infinitely close to 0; since the calculation results are in the domain
Figure BDA00037869933800001512
is rounded up, so it can be eliminated
Figure BDA00037869933800001513
and
Figure BDA00037869933800001514
These two parts are used to obtain the calculation result of the above formula;

根据计算结果,数据库DB获得最接近的k个索引条目,将其相应的生物特征模板集合发送给计算服务器CS,计算服务器CS将计算密文模板

Figure BDA00037869933800001515
和k个候选模板之间的欧几里德距离;According to the calculation result, the database DB obtains the closest k index entries, and sends its corresponding biometric template set to the calculation server CS, and the calculation server CS will calculate the ciphertext template
Figure BDA00037869933800001515
and the Euclidean distance between k candidate templates;

(3)计算服务器CS使用认证用户Ui的对称密钥

Figure BDA00037869933800001516
对密文EK(TA)进行解密,以获取生物特征模版
Figure BDA00037869933800001517
然后,计算
Figure BDA00037869933800001518
和候选模板
Figure BDA00037869933800001519
之间的欧几里德距离,计算公式如下:(3) The computing server CS uses the symmetric key of the authenticated user U i
Figure BDA00037869933800001516
Decrypt the ciphertext E K (T A ) to obtain the biometric template
Figure BDA00037869933800001517
Then, calculate
Figure BDA00037869933800001518
and candidate templates
Figure BDA00037869933800001519
The Euclidean distance between is calculated as follows:

Figure BDA0003786993380000161
Figure BDA0003786993380000161

如果上式中的欧几里德距离是在同态加密算法Paillier下根据其加法同态计算的,那么计算结果如下:If the Euclidean distance in the above formula is calculated according to its additive homomorphism under the homomorphic encryption algorithm Paillier, then the calculation result is as follows:

Figure BDA0003786993380000162
Figure BDA0003786993380000162

对于

Figure BDA0003786993380000163
Figure BDA0003786993380000164
这两部分,可以利用加法同态将其转换为下面的式子,转换公式如下:for
Figure BDA0003786993380000163
and
Figure BDA0003786993380000164
These two parts can be converted into the following formula by using additive homomorphism. The conversion formula is as follows:

Figure BDA0003786993380000165
Figure BDA0003786993380000165

Figure BDA0003786993380000166
Figure BDA0003786993380000166

对于

Figure BDA0003786993380000167
这部分,可以利用加法同态将其转换为下面的式子,转换公式如下:for
Figure BDA0003786993380000167
This part can be converted into the following formula by using additive homomorphism. The conversion formula is as follows:

Figure BDA0003786993380000168
Figure BDA0003786993380000168

由于上面的转换公式,计算服务器CS将

Figure BDA0003786993380000169
进行转换,转换公式如下:Due to the conversion formula above, the calculation server CS will
Figure BDA0003786993380000169
To convert, the conversion formula is as follows:

Figure BDA00037869933800001610
Figure BDA00037869933800001610

在计算服务器CS具有明文、密文模板TA

Figure BDA00037869933800001611
和加密的候选模板集合的前提下,计算服务器CS可以检查密文模板
Figure BDA00037869933800001612
和每个候选模板的欧几里德距离,结果中的最小欧几里德距离
Figure BDA00037869933800001613
是否满足设置的阈值T;如果小于设置的阈值T,计算服务器CS认为认证通过;否则,计算服务器CS认为认证失败。There is plaintext and ciphertext template T A in computing server CS,
Figure BDA00037869933800001611
and the encrypted candidate template set, the computing server CS can check the ciphertext template
Figure BDA00037869933800001612
The Euclidean distance to each candidate template, the minimum Euclidean distance in the result
Figure BDA00037869933800001613
Whether it satisfies the set threshold T; if it is less than the set threshold T, the computing server CS considers the authentication passed; otherwise, the computing server CS considers the authentication failed.

特征更新阶段包括:The feature update phase includes:

系统支持三种更新操作:添加、删除和修改,即新用户注册、现有用户撤销和基于可取消模板模块的现有用户密钥和特征模板的更新。具体过程如下:The system supports three update operations: add, delete, and modify, namely new user registration, existing user revocation, and update of existing user key and feature templates based on the cancelable template module. The specific process is as follows:

(1)新用户UADD通过提取器上传自己的生物特征数据,提取器对生物特征数据进行处理,分别生成加密的注册向量

Figure BDA0003786993380000171
和加密的特征模板
Figure BDA0003786993380000172
提取器将
Figure BDA0003786993380000173
发送到计算服务器CS,计算服务器CS将其发送到数据库DB,数据库DB将
Figure BDA0003786993380000174
添加到存储的加密索引中以完成新用户的注册;(1) The new user U ADD uploads his biometric data through the extractor, and the extractor processes the biometric data to generate encrypted registration vectors respectively
Figure BDA0003786993380000171
and the encrypted feature template
Figure BDA0003786993380000172
The extractor will
Figure BDA0003786993380000173
to the calculation server CS, the calculation server CS sends it to the database DB, and the database DB will
Figure BDA0003786993380000174
Added to the stored encrypted index to complete the registration of new users;

(2)现有用户撤销过程需要三个操作;首先,提取器收集并提取待撤销用户UDEL的生物特征;此外,提取器利用注册密钥

Figure BDA0003786993380000175
生成匹配索引条目
Figure BDA00037869933800001737
然后,提取器将索引条目
Figure BDA0003786993380000176
发送给计算服务器CS,计算服务器CS将其发送到数据库DB;最后,数据库DB在其存储的索引上删除索引条目
Figure BDA0003786993380000177
和匹配的加密模板
Figure BDA0003786993380000178
(2) The existing user revocation process requires three operations; first, the extractor collects and extracts the biometrics of the user U DEL to be revoked; in addition, the extractor utilizes the registration key
Figure BDA0003786993380000175
generate matching index entries
Figure BDA00037869933800001737
The extractor will then index the entry
Figure BDA0003786993380000176
Sent to Compute Server CS, Compute Server CS sends it to Database DB; Finally, Database DB deletes the index entry on the index it stores
Figure BDA0003786993380000177
and the matching encryption template
Figure BDA0003786993380000178

(3)当用户Ui的生物模板损坏或被盗时,用户Ui可以基于可取消模板模块重新输入生物特征;首先,提取器提取用户生物特征并获得注册索引项

Figure BDA0003786993380000179
和加密模板
Figure BDA00037869933800001710
此外,提取器生成新的注册和模板密钥
Figure BDA00037869933800001711
Figure BDA00037869933800001712
然后,提取器将
Figure BDA00037869933800001713
Figure BDA00037869933800001714
发送给计算服务器CS,计算服务器CS将其发送到数据库DB;最后,数据库DB利用索引项
Figure BDA00037869933800001715
去匹配索引I中与用户Ui相关的索引项
Figure BDA00037869933800001716
删除索引项
Figure BDA00037869933800001717
和相关的加密模板
Figure BDA00037869933800001718
并将
Figure BDA00037869933800001719
Figure BDA00037869933800001720
插入到加密索引I中。(3) When the biological template of user U i is damaged or stolen, user U i can re-enter the biometric feature based on the cancelable template module; first, the extractor extracts the user biometric feature and obtains the registration index item
Figure BDA0003786993380000179
and encrypted template
Figure BDA00037869933800001710
Additionally, the extractor generates new registration and template keys
Figure BDA00037869933800001711
and
Figure BDA00037869933800001712
Then, the extractor will
Figure BDA00037869933800001713
and
Figure BDA00037869933800001714
Sent to the computing server CS, the computing server CS sends it to the database DB; finally, the database DB utilizes the index item
Figure BDA00037869933800001715
To match the index items related to user U i in index I
Figure BDA00037869933800001716
delete index entry
Figure BDA00037869933800001717
and associated encryption templates
Figure BDA00037869933800001718
and will
Figure BDA00037869933800001719
and
Figure BDA00037869933800001720
Insert into encrypted index I.

其中,TA:可信中心;CS:计算服务器;DB:数据库;Ui、Uj:认证用户;

Figure BDA00037869933800001721
认证用户Ui的公钥;
Figure BDA00037869933800001722
认证用户Ui的私钥;
Figure BDA00037869933800001723
认证用户Ui的对称加密密钥;
Figure BDA00037869933800001724
认证密钥;Ri:注册用户;
Figure BDA00037869933800001725
索引构建密钥;vB:生物特征模板;vR:生物特征注册向量;Ti:候选模板;Paillier:一种同态加密算法;
Figure BDA00037869933800001726
注册向量;
Figure BDA00037869933800001727
扩展后的注册向量;I:加密索引;vA:特征向量;v′A:扩展后的特征向量;TA:生物特征模版;QA:认证查询;
Figure BDA00037869933800001728
欧几里德距离;AES:一种对称加密算法;M:随机可逆矩阵;M-1:M的逆矩阵;m1、m2:随机数;v″i:特征候选向量;
Figure BDA00037869933800001729
注册用户Ri的注册密钥;
Figure BDA00037869933800001730
模板密钥;
Figure BDA00037869933800001731
生物特征模板Ti的加密形式;
Figure BDA00037869933800001732
注册向量
Figure BDA00037869933800001733
的加密形式;Umax:数据库DB中的用户总数;
Figure BDA00037869933800001734
生物特征模版TA的同态加密形式;EK(TA):生物特征模版TA的对称加密形式;
Figure BDA00037869933800001735
认证用户Uj的对称密钥;
Figure BDA00037869933800001736
变换后的查询;UADD:新用户;
Figure BDA0003786993380000181
新用户UADD加密的注册向量;
Figure BDA0003786993380000182
新用户UADD加密的特征模板;UDEL:待撤销用户;
Figure BDA0003786993380000183
待撤销用户UDEL的注册密钥;
Figure BDA0003786993380000184
与待撤销用户UDEL匹配的索引条目;
Figure BDA0003786993380000185
与待撤销用户UDEL匹配的加密模板;
Figure BDA0003786993380000186
用户Ui新的注册索引项;
Figure BDA0003786993380000187
用户Ui新的加密模板;
Figure BDA0003786993380000188
用户Ui新的注册密钥;
Figure BDA0003786993380000189
用户Ui新的模板密钥;
Figure BDA00037869933800001810
新定义的向量运算;||:字符串连接操作;∑:累加运算;Π:连乘运算。Among them, TA: trusted center; CS: computing server; DB: database; U i , U j : authenticated users;
Figure BDA00037869933800001721
Authenticating the public key of user U i ;
Figure BDA00037869933800001722
Authenticating the private key of user U i ;
Figure BDA00037869933800001723
symmetric encryption key for authenticating user U i ;
Figure BDA00037869933800001724
Authentication key; R i : registered user;
Figure BDA00037869933800001725
Index construction key; v B : biometric template; v R : biometric registration vector; T i : candidate template; Paillier: a homomorphic encryption algorithm;
Figure BDA00037869933800001726
registration vector;
Figure BDA00037869933800001727
Extended registration vector; I: encrypted index; v A : feature vector; v′ A : extended feature vector; T A : biometric template; Q A : authentication query;
Figure BDA00037869933800001728
Euclidean distance; AES: a symmetric encryption algorithm; M: random reversible matrix; M -1 : the inverse matrix of M; m 1 , m 2 : random numbers; v″ i : feature candidate vector;
Figure BDA00037869933800001729
Registration key of registered user R i ;
Figure BDA00037869933800001730
template key;
Figure BDA00037869933800001731
An encrypted form of the biometric template T i ;
Figure BDA00037869933800001732
registration vector
Figure BDA00037869933800001733
encrypted form; U max : the total number of users in the database DB;
Figure BDA00037869933800001734
The homomorphic encryption form of the biometric template T A ; E K (T A ): the symmetric encryption form of the biometric template T A ;
Figure BDA00037869933800001735
symmetric key for authenticating user U j ;
Figure BDA00037869933800001736
Transformed query; U ADD : new user;
Figure BDA0003786993380000181
New user U ADD encrypted registration vector;
Figure BDA0003786993380000182
Feature template encrypted by new user U ADD ; U DEL : user to be revoked;
Figure BDA0003786993380000183
The registration key of the user U DEL to be revoked;
Figure BDA0003786993380000184
Index entries matching the user U DEL to be revoked;
Figure BDA0003786993380000185
The encryption template matching the user U DEL to be revoked;
Figure BDA0003786993380000186
User U i 's new registration index item;
Figure BDA0003786993380000187
User U i 's new encryption template;
Figure BDA0003786993380000188
User U i new registration key;
Figure BDA0003786993380000189
User U i new template key;
Figure BDA00037869933800001810
Newly defined vector operations; ||: string concatenation operation; ∑: accumulation operation; Π: multiplication operation.

为了验证本发明的可用性,以下将展示并说明基于联合生物识别的轻量级生物认证方法SELBA在仿真下的测试结果,仿真环境:在CPU 2.10G Hz的PC机上,Windows环境。In order to verify the usability of the present invention, the test results of the lightweight biometric authentication method SELBA based on combined biometrics under simulation will be shown and explained below, and the simulation environment: on a PC with a CPU 2.10GHz, Windows environment.

图4、图5和图6是对基于联合生物识别的轻量级生物认证方法SELBA与其他经典的生物认证方法在不同数据库(ORL、Yale和FERET数据库)中的认证准确性和认证时间对比。结果表明,本发明方法在不同数据库中的准确性低于基于CNN的方法,高于基于Gabor和基于PCA的方法。当不同数据库中的数据量达到一定程度时,本发明方法的认证准确度可以稳定在95%以上。在不同方法下,时间消耗将随着数据量的增加而线性增加。本发明方法的时间消耗略高于基于Gabor和基于PCA方法的时间消耗,但基于CNN方法的时间消耗大约是其他方法的四倍。高准确度的方法必然伴随着高开销,虽然基于CNN的准确性最高,但在移动设备上的应用需要考虑身份认证的准确性和效率。与其他方法相比,本发明方法实现了认证低成本和高安全性需求之间的均衡。Figure 4, Figure 5 and Figure 6 are the comparisons of authentication accuracy and authentication time between the lightweight biometric authentication method SELBA based on joint biometrics and other classic biometric authentication methods in different databases (ORL, Yale, and FERET databases). The results show that the accuracy of the method of the present invention in different databases is lower than that based on CNN, and higher than that based on Gabor and PCA. When the amount of data in different databases reaches a certain level, the authentication accuracy of the method of the invention can be stabilized above 95%. Under different methods, the time consumption will increase linearly with the increase of data volume. The time consumption of the method of the present invention is slightly higher than that of the Gabor-based and PCA-based methods, but the time consumption of the CNN-based method is about four times that of other methods. High-accuracy methods are bound to be accompanied by high overhead. Although the accuracy based on CNN is the highest, the application on mobile devices needs to consider the accuracy and efficiency of identity authentication. Compared with other methods, the method of the invention realizes the balance between authentication low cost and high safety requirement.

图7、图8和图9是对基于联合生物识别的轻量级生物认证方法SELBA中LBP特征描述子的维度在不同数据库(ORL、Yale和FERET数据库)下对不同数据量的认证准确度的影响进行仿真。结果表明,在不同的数据库中,数据量越大,识别准确度越高。此外,描述符的维数越大,识别准确度越高。从图7、图8和图9可以看出,3×3维描述子的识别率比8×6维描述子高10%以上。根据仿真结果,可以观察到,与其他三种方法相比,本发明方法在保护生物数据隐私的基础上保持了较高的身份认证准确性,并且不会造成较大的额外计算开销。Figure 7, Figure 8 and Figure 9 are the authentication accuracy of different data volumes in different databases (ORL, Yale and FERET databases) for the dimensions of the LBP feature descriptor in the lightweight biometric authentication method SELBA based on joint biometrics Effects are simulated. The results show that in different databases, the larger the data volume, the higher the recognition accuracy. In addition, the larger the dimensionality of the descriptor, the higher the recognition accuracy. It can be seen from Fig. 7, Fig. 8 and Fig. 9 that the recognition rate of the 3×3 dimensional descriptor is more than 10% higher than that of the 8×6 dimensional descriptor. According to the simulation results, it can be observed that, compared with the other three methods, the method of the present invention maintains a high identity authentication accuracy on the basis of protecting the privacy of biological data, and does not cause large additional calculation overhead.

图10是对基于联合生物识别的轻量级生物认证方法SELBA与其他经典的生物认证方法在不同特征向量大小下生成密钥和生成令牌的时间对比。结果表明,本发明方法和Zhu等人的方法生成密钥的时间成本随着向量大小的增加而线性增加。当向量大小为16位时,创建密钥的平均时间分别约为110毫秒和290毫秒。当大小增加到256位时,它们的平均时间开销将分别增加到1100ms和1253ms。然而,对于Zhou等人的方法来说,当向量大小从16位增加到256位时,平均时间成本从100ms增加到2300ms,并呈现指数增长趋势。Zhou等人的方法使用矩阵作为密钥,矩阵大小将与向量大小同步变化,而本发明方法和Zhu等人的方法基于同态加密,因此密钥大小可以不受向量大小的影响。此外,三种方法中生成令牌的时间成本也随着向量维数的增加而增加,但增加远小于密钥生成。当大小为16位时,本发明方法、Zhu等人的方法和Zhou等人的方法生成令牌平均时间分别约为30ms、220ms和60ms。当大小增加到256位时,平均时间分别达到150ms、1200ms和860ms左右。由于Zhu等人的方法引入的双线性配对,在令牌生成过程中,其开销大大高于其他两种方法。仿真结果表明,本发明方法生成密钥和生成令牌的时间成本处于低水平,相比于其他生物认证方法在实际中具有优势。Figure 10 is a comparison of the time of key generation and token generation under different eigenvector sizes between the lightweight biometric authentication method SELBA based on joint biometric identification and other classic biometric authentication methods. The results show that the time cost of key generation for the method of the present invention and the method of Zhu et al. increases linearly with the increase of vector size. When the vector size is 16 bits, the average time to create the key is about 110 ms and 290 ms, respectively. When the size increases to 256 bits, their average time overhead increases to 1100ms and 1253ms, respectively. However, for the method of Zhou et al., when the vector size increases from 16 bits to 256 bits, the average time cost increases from 100ms to 2300ms, showing an exponential growth trend. The method of Zhou et al. uses a matrix as a key, and the size of the matrix will change synchronously with the size of the vector, while the method of the present invention and the method of Zhu et al. are based on homomorphic encryption, so the size of the key can not be affected by the size of the vector. In addition, the time cost of token generation in the three methods also increases with the increase of vector dimension, but the increase is much smaller than that of key generation. When the size is 16 bits, the average token generation time of the method of the present invention, the method of Zhu et al. and the method of Zhou et al. is about 30ms, 220ms and 60ms respectively. When the size was increased to 256 bits, the average times reached around 150ms, 1200ms and 860ms respectively. Due to the bilinear pairing introduced by the method of Zhu et al., its overhead is significantly higher than the other two methods during token generation. Simulation results show that the method of the present invention has a low time cost for key generation and token generation, and has advantages in practice compared with other biometric authentication methods.

图11是对基于联合生物识别的轻量级生物认证方法SELBA与其他经典的生物认证方法在FERET数据库中索引构建的时间对比。这三个方法的索引结构均是反向索引,索引构建的时间成本都随着训练数据量的增加而线性增长。当训练数据量为200时,本发明方法、Zhu等人的方法和Zhou等人的方法的平均时间开销分别保持在0.16s、0.45s和0.38s左右。当数据量增加到1000时,成本增加到10秒、12秒和9秒左右。仿真结果表明,在实际应用中,本发明方法的索引构造的时间开销在可接受的范围内。Figure 11 is a time comparison of index construction in the FERET database between the lightweight biometric authentication method SELBA based on joint biometrics and other classic biometric authentication methods. The index structures of these three methods are all inverted indexes, and the time cost of index construction increases linearly with the increase of the amount of training data. When the amount of training data is 200, the average time overhead of the method of the present invention, the method of Zhu et al. and the method of Zhou et al. is kept at about 0.16s, 0.45s and 0.38s respectively. When the amount of data increases to 1000, the cost increases to about 10 seconds, 12 seconds and 9 seconds. Simulation results show that in practical applications, the time overhead of the index construction of the method of the present invention is within an acceptable range.

图12是对基于联合生物识别的轻量级生物认证方法SELBA与其他经典的生物认证方法在FERET数据库中查询的时间对比。本发明方法、Zhu等人的方法和Zhou等人的方法的查询时间随着向量大小的增加呈指数增长趋势。当向量大小为16位时,训练数据的变化对查询时间成本的影响很小,而当向量大小为64或256位时,训练数据的变化将极大地影响查询开销。然而,较小的特征向量大小不能很好地描述特征。在实际应用场景中,将特征向量设置为64位是一种考虑准确性和效率的较好选择。仿真结果表明,与其他方法相比,本发明方法实现了认证低成本和高安全性需求之间的均衡。Figure 12 is a comparison of query time in the FERET database between the lightweight biometric authentication method SELBA based on joint biometrics and other classic biometric authentication methods. The query time of the method of the present invention, the method of Zhu et al. and the method of Zhou et al. increases exponentially with the increase of the vector size. When the vector size is 16 bits, the variation of the training data has little impact on the query time cost, while when the vector size is 64 or 256 bits, the variation of the training data will greatly affect the query overhead. However, smaller eigenvector sizes do not describe features well. In practical application scenarios, setting the feature vector to 64 bits is a better choice considering accuracy and efficiency. Simulation results show that, compared with other methods, the method of the present invention achieves a balance between authentication low cost and high security requirements.

图13、图14和图15是对基于联合生物识别的轻量级生物认证方法SELBA与其他经典的生物认证方法在不同向量大小和数据量下加密向量计算的时间开销对比。图13和图14分别显示了当向量大小为16位和64位时,时间开销随数据量的增加而变化。其中,Zhu等人的方法的成本远高于本发明方法和Zhou等人的方法。这主要是由于Zhu等人的方法的计算过程包含许多线性配对运算,并且在计算之前需要验证令牌的有效性。图15显示了当向量大小增加到256位时,本发明方法和Zhou等人的方法在不同数据量下的时间成本逐渐接近Zhu等人的方法。仿真结果表明,与其他方法相比,本发明方法实现了认证低成本和高安全性需求之间的均衡。Fig. 13, Fig. 14 and Fig. 15 are comparisons of the time overhead of encryption vector calculation under different vector sizes and data volumes between the lightweight biometric authentication method SELBA based on joint biometrics and other classic biometric authentication methods. Figure 13 and Figure 14 show the variation of time overhead as the amount of data increases when the vector size is 16 bits and 64 bits, respectively. Among them, the cost of the method of Zhu et al. is much higher than the method of the present invention and the method of Zhou et al. This is mainly due to the fact that the calculation process of Zhu et al.'s method contains many linear pairing operations, and the validity of tokens needs to be verified before calculation. Figure 15 shows that when the vector size increases to 256 bits, the time cost of the method of the present invention and the method of Zhou et al. under different data volumes gradually approach the method of Zhu et al. Simulation results show that, compared with other methods, the method of the present invention achieves a balance between authentication low cost and high security requirements.

应当注意,本发明方法可以通过硬件、软件或者软件和硬件的结合来实现,硬件部分可以利用专用逻辑来实现;软件部分可以存储在存储器中,由适当的指令执行系统,例如微处理器或者专用设计硬件来执行。本领域的普通技术人员可以理解上述的设备和方法可以使用计算机可执行指令和/或包含在处理器控制代码中来实现,例如在诸如磁盘、CD或DVD-ROM的载体介质、诸如只读存储器(固件)的可编程的存储器或者诸如光学或电子信号载体的数据载体上提供了这样的代码。本发明的设备及其模块可以由诸如超大规模集成电路或门阵列、诸如逻辑芯片、晶体管等的半导体、或者诸如现场可编程门阵列、可编程逻辑设备等的可编程硬件设备的硬件电路实现,也可以用由各种类型的处理器执行的软件实现,也可以由上述硬件电路和软件的结合例如固件来实现。It should be noted that the method of the present invention can be realized by hardware, software or a combination of software and hardware, and the hardware part can be realized by using dedicated logic; the software part can be stored in a memory, and executed by an appropriate instruction system, such as a microprocessor or a dedicated Design the hardware to execute. Those of ordinary skill in the art will understand that the above-described devices and methods can be implemented using computer-executable instructions and/or contained in processor control code, for example, on a carrier medium such as a magnetic disk, CD or DVD-ROM, such as a read-only memory Such code is provided on a programmable memory (firmware) or on a data carrier such as an optical or electronic signal carrier. The device and its modules of the present invention may be implemented by hardware circuits such as VLSI or gate arrays, semiconductors such as logic chips, transistors, etc., or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., It can also be realized by software executed by various types of processors, or by a combination of the above-mentioned hardware circuits and software such as firmware.

以上仅为本发明的实施例,但本发明保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,都应涵盖在本发明的保护范围之内。The above is only an embodiment of the present invention, but the scope of protection of the present invention is not limited thereto. Anyone familiar with the technical field within the technical scope disclosed in the present invention, any work done within the spirit and principles of the present invention Modifications, equivalent replacements and improvements, etc., should all be covered within the protection scope of the present invention.

Claims (10)

1. A lightweight biometric authentication method based on joint biometric identification is characterized by comprising the following steps:
s101: the trusted center TA generates a series of keys for authenticating the user U i Generating public keys
Figure FDA0003786993370000011
Private key
Figure FDA0003786993370000012
Symmetric encryption key
Figure FDA0003786993370000013
And an authentication key
Figure FDA0003786993370000014
For registering a user R i Generating an index build key
Figure FDA0003786993370000015
S102: extractor by obfuscating biometric templates v B To construct a d-vitamin profile registryQuantity v R And a biometric template T i And encrypting the biological characteristic template T by using a public key of a homomorphic encryption algorithm Paillier i
S103: extractor extended registration vector
Figure FDA0003786993370000016
To
Figure FDA0003786993370000017
Using registration keys
Figure FDA0003786993370000018
Encryption
Figure FDA0003786993370000019
Will be provided with
Figure FDA00037869933700000110
Sending the index I to a computing server CS, encrypting the index I by the computing server CS and sending the index I to a database DB;
s104: extractor extended feature vector v A To v' A For extended feature vector v' A And a biometric template T A Is encrypted and will
Figure FDA00037869933700000111
And E K (T A ) Sending to a computing server CS;
s105: the database DB receives the encryption index I and the authentication query Q A Transforming, computing each enrollment template and authentication query Q A The similarity between the candidate templates is sent to the computing server CS so that the computing server CS can compute the Euclidean distance
Figure FDA00037869933700000112
S106: three update operations are supported: addition, deletion, and modification, i.e., new user registration, existing user revocation, and updating of existing user keys and feature templates based on the revocable template module.
2. The method of claim 1, comprising a key generation phase, a feature encryption phase, an index generation phase, a token generation phase, an authentication phase, and a feature update phase;
the key generation phase comprises:
(1) The trusted center TA is an authenticated user U i Generating two large prime numbers p and q, and generating a public key based on a homomorphic encryption algorithm Paillier
Figure FDA00037869933700000113
Wherein n = pq, g is a random number less than n 2; private key
Figure FDA00037869933700000114
Wherein α = lcm (p-1, q-1),
Figure FDA00037869933700000115
in addition, the trusted center TA is an authenticated user U i Symmetric encryption key generation based on symmetric encryption algorithm AES
Figure FDA00037869933700000116
(2) Firstly, the trusted center TA is the authenticated user U i Generating a random invertible matrix and its inverses M, M -1 ∈Z 2d×2d Where d is the dimension of the feature vector; then, for each authenticated user U i The trusted center TA generates two random matrices
Figure FDA0003786993370000021
As an authentication key, wherein
Figure FDA0003786993370000022
Finally, for each registered user R i The trusted center TA generates two random matrices
Figure FDA0003786993370000023
Constructing the key as an index, wherein
Figure FDA0003786993370000024
3. The method of claim 2, wherein the encryption characterization phase comprises:
(1) Obtaining N M-dimensional vectors through face and fingerprint feature extraction
Figure FDA0003786993370000025
And an n-dimensional vector v f I =1, \ 8230;, N; defining operations
Figure FDA0003786993370000026
The calculation formula is as follows:
Figure FDA0003786993370000027
the obfuscated biometric templates obtained were as follows:
Figure FDA0003786993370000028
(2) The extractor is first operated at v B Randomly selects m in each vector 1 Number, m 1 E is M, and data of relevant subscripts in each vector are obtained to construct a characteristic candidate vector v i ", i =1, \ 8230;, N, randomly generated subscript defines the user's registration key
Figure FDA0003786993370000029
The extractor connects the feature candidate vectors based on the 'string connection' operation to construct a d-vitamin feature registration vector, and the calculation formula is as follows:
v R =v 1 ″||v 2 ″||…||v N
l |: character string connection operation;
(3) Extractor at v B Randomly selects m in each vector 2 Number m 2 Belongs to M, randomly generated subscript is defined as a template key of a user
Figure FDA00037869933700000210
Obtaining data of related subscript in each vector to construct biological feature template T i The calculation formula is as follows:
Figure FDA00037869933700000211
(4) The extractor encrypts the biological characteristic template Ti by using a public key of a homomorphic encryption algorithm Paillier, wherein an encryption formula is as follows:
Figure FDA00037869933700000212
4. the method of claim 3, wherein generating the index phase comprises:
(1) First, the extractor expands each registration vector
Figure FDA0003786993370000031
To
Figure FDA0003786993370000032
The expansion formula is as follows:
Figure FDA0003786993370000033
wherein
Figure FDA0003786993370000034
Is a liftExtractor for each registration vector
Figure FDA0003786993370000035
A randomly selected number; sigma: performing accumulation operation;
(2) The extractor then uses the registration key
Figure FDA0003786993370000036
Encryption
Figure FDA0003786993370000037
The encryption formula is as follows:
Figure FDA0003786993370000038
wherein,
Figure FDA0003786993370000039
p 1 >>p 2 and gamma is>>2|max(ε i )|,
Figure FDA00037869933700000310
Defined as an integer confusion vector randomly selected from a probability distribution;
Figure FDA00037869933700000311
is formed by a registration vector
Figure FDA00037869933700000312
A composed ciphertext; extractor with tuples
Figure FDA00037869933700000313
In the form of
Figure FDA00037869933700000314
And
Figure FDA00037869933700000315
from registered user R i Transmitting to a computing server CS; when the computing server CS receives the encrypted metanodes of all registered users, an encryption index will be created
Figure FDA00037869933700000316
Figure FDA00037869933700000317
Wherein U is max Representing the total number of users in the database DB; the encryption index I will be transmitted by the calculation server CS to the database DB for storage.
5. The method of claim 4, wherein the generating the token phase comprises:
(1) First, the extractor authenticates the user U from the certificate i Extracting a feature vector v from the biological features A And has a registration key
Figure FDA00037869933700000318
And template key
Figure FDA00037869933700000319
Biological characteristic template T A
(2) The extractor then expands the feature vector v A To v' A The expansion formula is as follows:
Figure FDA00037869933700000320
wherein
Figure FDA00037869933700000321
The extractor is an authenticated user U j To authenticate the randomly selected number, needs to pay attention to eta j Is a positive number;
(3) Next, the extractor uses the authenticated user U j Authentication key of
Figure FDA00037869933700000322
To extension vector v' A Encryption is carried out, and an encryption formula is as follows:
Figure FDA00037869933700000323
wherein
Figure FDA00037869933700000324
Is an integer confusion vector randomly selected by the extractor; the extractor will encrypt the authentication query Q A Sends it to the computing server CS, and then sends an authentication query Q A Sending the data to a database DB for authentication;
(4) Extractor use authentication user U j The public key of the homomorphic encryption algorithm Paillier
Figure FDA0003786993370000041
Template T for biological characteristics A Encrypting to obtain ciphertext
Figure FDA0003786993370000042
In addition, the extractor uses the authenticated user U j Symmetric key of (2)
Figure FDA0003786993370000043
To biological characteristic template T A Encrypt to obtain ciphertext E K (T A ) (ii) a The extractor will
Figure FDA0003786993370000044
And E K (T A ) And sending the result to a computing server CS for Euclidean distance computation of subsequent ciphertexts.
6. The method of claim 5, wherein the authentication process comprises three steps: first, the database DB receives the encryption index I and the authentication query Q A Carrying out conversion; the database DB then stores the encryption index according to it
Figure FDA0003786993370000045
Computing each enrollment template and authentication query Q A Similarity between them; finally, the database DB sends the set of candidate templates to the computation server CS for use by the computation server CS with the set of candidate templates and the ciphertext
Figure FDA0003786993370000046
The correlated characteristic template calculates the Euclidean distance between the two characteristic templates; the specific process is as follows:
(1) Database DB for encryption index received from extractor
Figure FDA0003786993370000047
Each of which is
Figure FDA0003786993370000048
Carrying out conversion; the database DB then re-matches the authentication query Q received from the extractor A And performing transformation, wherein the transformation formula is as follows:
Figure FDA0003786993370000049
Figure FDA00037869933700000410
(2) Database DB computation-transformed queries
Figure FDA00037869933700000411
And each encrypted item in the encryption index I
Figure FDA00037869933700000412
The formula for calculating the relevance score is as follows:
Figure FDA00037869933700000413
wherein
Figure FDA00037869933700000414
Is the random number part of the similarity score, eliminated
Figure FDA00037869933700000415
And
Figure FDA00037869933700000416
these two parts are used to obtain the calculation result of the above formula;
according to the calculation result, the database DB obtains the nearest k index entries, sends the corresponding biological characteristic template set to the calculation server CS, and the calculation server CS calculates the ciphertext template
Figure FDA0003786993370000051
And euclidean distances between the k candidate templates;
(3) Computing server CS uses authentication user U i Symmetric key of
Figure FDA0003786993370000052
For ciphertext E K (T A ) Decrypting to obtain the biological characteristic template
Figure FDA0003786993370000053
Then, calculate
Figure FDA0003786993370000054
And candidate templates
Figure FDA0003786993370000055
The euclidean distance between them, the calculation formula is as follows:
Figure FDA0003786993370000056
if the Euclidean distance in the above equation is computed from its additive homomorphism under the homomorphic encryption algorithm Paillier, then the computation result is as follows:
Figure FDA0003786993370000057
for
Figure FDA0003786993370000058
And
Figure FDA0003786993370000059
these two parts, using additive homomorphism, are converted to the following equation:
Figure FDA00037869933700000510
Figure FDA00037869933700000511
II: performing continuous multiplication operation;
for the
Figure FDA00037869933700000512
This section, using additive homomorphism, converts it into the following equation:
Figure FDA00037869933700000513
the computing server CS will
Figure FDA00037869933700000514
Conversion is carried out, and the conversion formula is as follows:
Figure FDA00037869933700000515
having plaintext, ciphertext templates T in the computing server CS A
Figure FDA00037869933700000516
And on the premise of the encrypted candidate template set, the computing server CS checks the ciphertext template
Figure FDA00037869933700000517
And the Euclidean distance of each candidate template, the minimum Euclidean distance in the result
Figure FDA0003786993370000061
Whether a set threshold T is met; if the value is smaller than the set threshold value T, the computing server CS considers that the authentication is passed; otherwise, the computing server CS considers the authentication as failed.
7. The method of claim 6, wherein the feature update phase comprises:
the system supports three update operations: adding, deleting and modifying, namely registering a new user, canceling an existing user and updating an existing user key and a feature template based on a revocable template module, the specific process is as follows:
(1) New user U ADD Uploading own biological characteristic data through an extractor, processing the biological characteristic data by the extractor, and respectively generating encrypted registration vectors
Figure FDA0003786993370000062
And encrypted feature templates
Figure FDA0003786993370000063
The extractor will
Figure FDA0003786993370000064
To the calculation server CS, which sends it to the database DB, which will
Figure FDA0003786993370000065
Adding the new user into the stored encryption index to complete the registration of the new user;
(2) The existing user revocation process requires three operations; first, the extractor collects and extracts the users U to be revoked DEL The biological characteristic of (a); in addition, the extractor utilizes the registration key
Figure FDA0003786993370000066
Generating matching index entries
Figure FDA0003786993370000067
The extractor then indexes the entry
Figure FDA0003786993370000068
Sending the data to a computing server CS, and sending the data to a database DB by the computing server CS; finally, the database DB deletes the index entry on the index it stores
Figure FDA0003786993370000069
And matched encryption template
Figure FDA00037869933700000610
(3) When the user U i When the biological template is damaged or stolen, the user U i Re-inputting the biological characteristics based on the template module which can be cancelled; first, an extractor extracts a user biometric feature and obtains a registration index item
Figure FDA00037869933700000611
And an encryption template
Figure FDA00037869933700000612
In addition, the extractor generates new enrollment and template keys
Figure FDA00037869933700000613
And
Figure FDA00037869933700000614
then, the extractor will
Figure FDA00037869933700000615
And
Figure FDA00037869933700000616
sending the data to a computing server CS, and sending the data to a database DB by the computing server CS; finally, the database DB utilizes the index entry
Figure FDA00037869933700000622
Dematching encryption index I with user U i Related indexing item
Figure FDA00037869933700000617
Deleting an index entry
Figure FDA00037869933700000618
And associated cryptographic templates
Figure FDA00037869933700000619
And will be
Figure FDA00037869933700000620
And
Figure FDA00037869933700000621
inserted into the encryption index I.
8. A storage medium for use in a method according to any of claims 1-7, wherein the program storage medium is stored for enabling an electronic device to execute via a computer program by receiving user input.
9. A lightweight biometric authentication system for use in the method of claims 1-8, wherein the lightweight biometric authentication system comprises:
the extractor is used for extracting biological characteristics, generating a template module which can be cancelled and encrypting a template;
a trusted center for generating a key;
a calculation server for calculating a euclidean distance of the encrypted biometric feature;
and the database is used for storing the indexes.
10. The system of claim 9, wherein the lightweight biometric authentication system is mounted on a terminal, and the terminal is an internet of things terminal.
CN202210945193.2A 2022-08-08 2022-08-08 Lightweight biological authentication method and system based on combined biological recognition Active CN115278673B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210945193.2A CN115278673B (en) 2022-08-08 2022-08-08 Lightweight biological authentication method and system based on combined biological recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210945193.2A CN115278673B (en) 2022-08-08 2022-08-08 Lightweight biological authentication method and system based on combined biological recognition

Publications (2)

Publication Number Publication Date
CN115278673A true CN115278673A (en) 2022-11-01
CN115278673B CN115278673B (en) 2024-07-23

Family

ID=83748315

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210945193.2A Active CN115278673B (en) 2022-08-08 2022-08-08 Lightweight biological authentication method and system based on combined biological recognition

Country Status (1)

Country Link
CN (1) CN115278673B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115913580A (en) * 2023-02-21 2023-04-04 杭州天谷信息科技有限公司 Homomorphic encryption-based biometric authentication method and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150341349A1 (en) * 2014-05-23 2015-11-26 Fujitsu Limited Privacy-preserving biometric authentication
CN107919965A (en) * 2018-01-05 2018-04-17 杭州电子科技大学 A kind of biological characteristic sensitive information outsourcing identity identifying method based on homomorphic cryptography
CN108475309A (en) * 2015-08-21 2018-08-31 维尔蒂姆知识产权有限公司 System and method for biological characteristic consensus standard
CN112329519A (en) * 2020-09-21 2021-02-05 中国人民武装警察部队工程大学 A Secure Online Fingerprint Matching Method
US20210124815A1 (en) * 2019-10-25 2021-04-29 Visa International Service Association Optimized private biometric matching
CN112733111A (en) * 2020-12-31 2021-04-30 暨南大学 Threshold predicate encryption biometric feature authentication method based on segment segmentation
CN113239336A (en) * 2021-06-02 2021-08-10 西安电子科技大学 Privacy protection biological characteristic authentication method based on decision tree
US20220109574A1 (en) * 2020-10-01 2022-04-07 Tata Consultancy Services Limited Method and system for privacy preserving multifactor biometric authentication

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150341349A1 (en) * 2014-05-23 2015-11-26 Fujitsu Limited Privacy-preserving biometric authentication
CN108475309A (en) * 2015-08-21 2018-08-31 维尔蒂姆知识产权有限公司 System and method for biological characteristic consensus standard
CN107919965A (en) * 2018-01-05 2018-04-17 杭州电子科技大学 A kind of biological characteristic sensitive information outsourcing identity identifying method based on homomorphic cryptography
US20210124815A1 (en) * 2019-10-25 2021-04-29 Visa International Service Association Optimized private biometric matching
CN112329519A (en) * 2020-09-21 2021-02-05 中国人民武装警察部队工程大学 A Secure Online Fingerprint Matching Method
US20220109574A1 (en) * 2020-10-01 2022-04-07 Tata Consultancy Services Limited Method and system for privacy preserving multifactor biometric authentication
CN112733111A (en) * 2020-12-31 2021-04-30 暨南大学 Threshold predicate encryption biometric feature authentication method based on segment segmentation
CN113239336A (en) * 2021-06-02 2021-08-10 西安电子科技大学 Privacy protection biological characteristic authentication method based on decision tree

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
GOMEZ B M ET AL.: "Multi-biometric template protection based on homomorphic encryption", PATTERN RECOGNITION, 31 December 2017 (2017-12-31) *
张宁;臧亚丽;田捷;: "生物特征与密码技术的融合――一种新的安全身份认证方案", 密码学报, no. 02, 15 April 2015 (2015-04-15) *
杨雄;张晓惠;: "基于全同态加密的人脸特征密文认证系统", 微电子学与计算机, no. 09, 5 September 2020 (2020-09-05) *
王会勇;唐士杰;丁勇;王玉珏;李佳慧;: "生物特征识别模板保护综述", 计算机研究与发展, no. 05, 15 May 2020 (2020-05-15) *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115913580A (en) * 2023-02-21 2023-04-04 杭州天谷信息科技有限公司 Homomorphic encryption-based biometric authentication method and system

Also Published As

Publication number Publication date
CN115278673B (en) 2024-07-23

Similar Documents

Publication Publication Date Title
Yuan et al. Efficient privacy-preserving biometric identification in cloud computing
US8842887B2 (en) Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device
Wang et al. A blind system identification approach to cancelable fingerprint templates
JP6037366B2 (en) Method for authenticating user corresponding to encrypted data and system for authenticating user corresponding to biometric data
US9887989B2 (en) Protecting passwords and biometrics against back-end security breaches
Zhao et al. Negative iris recognition
JP2020520509A (en) Biometric identification system and method
JP2000315999A (en) Cryptographic key generating method
Jindal et al. Secure and privacy preserving method for biometric template protection using fully homomorphic encryption
Morampudi et al. Secure and verifiable iris authentication system using fully homomorphic encryption
Govindarajan et al. Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data
KR102274132B1 (en) User authentication server that performs verification of electronic signature data generated based on biometric authentication in association with a plurality of verification servers and operating method thereof
US20070038863A1 (en) System and Method for Decoupling Identification from Biometric Information in Biometric Access Systems
CN114065169A (en) Privacy protection biometric authentication method and device and electronic equipment
Kuznetsov et al. Deep learning-based biometric cryptographic key generation with post-quantum security
Zhu et al. A two-step hybrid approach for voiceprint-biometric template protection
CN105553980A (en) Safety fingerprint identification system and method based on cloud computing
Wang et al. Joint biological ID: A secure and efficient lightweight biometric authentication scheme
Wang et al. A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system
Wilber et al. Secure remote matching with privacy: Scrambled support vector vaulted verification (s 2 v 3)
Teoh et al. Cancellable biometrics and user-dependent multi-state discretization in BioHash
CN115278673B (en) Lightweight biological authentication method and system based on combined biological recognition
Selimovic et al. Authentication based on the image encryption using delaunay triangulation and catalan objects
Sharma et al. Fully homomorphic encryption operators for score and decision fusion in biometric identification
Kumar et al. Secure Data Storage and Retrieval over the Encrypted Cloud Computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant