CN115278673A - Lightweight biometric authentication method and system based on joint biometric identification - Google Patents

Lightweight biometric authentication method and system based on joint biometric identification Download PDF

Info

Publication number
CN115278673A
CN115278673A CN202210945193.2A CN202210945193A CN115278673A CN 115278673 A CN115278673 A CN 115278673A CN 202210945193 A CN202210945193 A CN 202210945193A CN 115278673 A CN115278673 A CN 115278673A
Authority
CN
China
Prior art keywords
template
extractor
user
vector
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210945193.2A
Other languages
Chinese (zh)
Inventor
樊凯
王昊洋
肖进
陈红艳
高楠
李晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN202210945193.2A priority Critical patent/CN115278673A/en
Publication of CN115278673A publication Critical patent/CN115278673A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

In the method and the system for lightweight biometric authentication based on joint biometric identification, a trusted center generates a series of keys; the extractor constructs a d-vitamin feature registration vector and a biological feature template by confusing the biological feature template, and encrypts the feature template by using a public key of a homomorphic encryption algorithm; the extractor expands the registration vector, encrypts and sends the registration vector to a calculation server by using a registration key, and encrypts and sends an index to a database by the calculation server; the extractor expands the characteristic vector, encrypts the expanded vector and the biological characteristic template and sends the encrypted expanded vector and the encrypted biological characteristic template to the computing server; the database transforms the received index and the authentication query, calculates the similarity between each registration template and the authentication query, and sends the candidate template set to a calculation server to calculate the Euclidean distance; three update operations are supported: add, delete, and modify; the invention meets the confidentiality, renewability, revocable, irreversibility and non-connectability of biological identification, and realizes the balance of low-cost authentication and high-safety requirements.

Description

Lightweight biometric authentication method and system based on joint biometric identification
Technical Field
The invention belongs to the technical field of biological feature identification, and particularly relates to a lightweight biometric authentication method and system based on joint biometric identification.
Background
In recent years, the popularization of smart mobile devices has improved the quality of life of people, the market scale of mobile devices has been expanding, and smart watches, tablet computers and other mobile devices have also promoted the expansion of the mobile market. While mobile devices offer convenience to people, they also pose a threat to the privacy and security of users. As users store personal sensitive information (such as bank accounts and image data) on smart mobile devices, the exposure of personal privacy is also a focus of interest for researchers.
Most existing smart mobile devices utilize knowledge-based authentication mechanisms to ensure their own security and data privacy (e.g., PIN code-based, pattern-based password authentication). However, most users tend to set simple and weak passwords for easy memorization. Such knowledge-based authentication is vulnerable to snooping attacks and dictionary attacks so that an attacker can gain access to personally sensitive information stored in the device. The biological characteristic technology utilizes the uniqueness, the universality, the stability and the acquirability of the biological characteristic technology to promote the continuous development of the biological characteristic authentication, so that the biological characteristic authentication is more convenient and accurate. It also overcomes the vulnerability of password settings in knowledge-based authentication.
Through the above analysis, the problems and defects of the prior art are as follows: most of the existing biological authentication methods are based on single biological characteristics, are low in accuracy and stability, and cannot be applied to different application backgrounds; furthermore, existing biometric authentication methods are not secure and may be compromised by artificial synthesis, replay, and spoofing attacks upon biometric theft, damage, or forgery.
The difficulty in solving the above problems and defects is: (1) The computing power and memory power of smart mobile devices are limited, and therefore a lightweight biometric authentication method needs to be designed. (2) Most of the existing biometric authentication methods are based on a single biometric feature, are not high in accuracy and stability, and cannot be applied to different application backgrounds, so that the designed method needs to be capable of integrating the biometric features to realize comprehensive application of various biometric information. (3) Biometric-based identity authentication may be threatened by artificial synthesis, replay, and spoofing attacks once a biometric is stolen, damaged, or forged due to the uniqueness of the biometric. Therefore, the designed method needs to be able to reconstruct the user biometric template after the biometric is stolen or damaged.
Disclosure of Invention
In order to overcome the disadvantages of the prior art, the present invention provides a lightweight biometric authentication method and system based on joint biometric identification, which is adapted to the application environment of the smart mobile device at the present stage, and combines knowledge-based authentication and authentication based on multiple biometric features to overcome the low security of using only password authentication, and the application of a removable template module can prevent the non-restorability of the biometric template after being stolen or damaged, and has the advantages of high security and low overhead.
In order to achieve the purpose, the invention adopts the technical scheme that:
a lightweight biometric authentication method based on joint biometric identification comprises the following steps:
s101: the trusted center TA generates a series of keys for authenticating the user U i Generating a public key
Figure BDA0003786993380000021
Private key
Figure BDA0003786993380000022
Symmetric encryption key
Figure BDA0003786993380000023
And an authentication key
Figure BDA0003786993380000024
For registering a user R i Generating index build keys
Figure BDA0003786993380000025
S102: extractor by obfuscating biometric templates v B To construct a d-vitamin feature registration vector v R And a biometric template T i And encrypting the biological characteristic template T by using a public key of a homomorphic encryption algorithm Paillier i
S103: extractor extended registration vector
Figure BDA0003786993380000026
To
Figure BDA0003786993380000027
Using registration keys
Figure BDA0003786993380000028
Encryption
Figure BDA0003786993380000029
Will be provided with
Figure BDA00037869933800000210
Sending the index I to a computing server CS, encrypting the index I by the computing server CS and sending the index I to a database DB;
s104: extractor extended feature vector v A To v' A For extended feature vector v' A And a biometric template T A Is encrypted and will
Figure BDA00037869933800000211
And E K (T A ) Send to calculation clothesA server CS;
s105: database DB for receiving encryption index I and authentication query Q A Transforming, computing each enrollment template and authentication query Q A The candidate template set is sent to the computation server CS for the computation server CS to compute the Euclidean distance
Figure BDA00037869933800000212
S106: three update operations are supported: addition, deletion, and modification, i.e., new user registration, existing user revocation, and updating of existing user keys and feature templates based on the revocable template module.
The lightweight biometric authentication method based on the joint biometric identification comprises a key generation stage, a feature encryption stage, an index generation stage, a token generation stage, an authentication stage and a feature updating stage;
the key generation phase comprises:
(1) The trusted center TA is an authenticated user U i Generating two large prime numbers p and q, and generating a public key based on a homomorphic encryption algorithm Paillier
Figure BDA0003786993380000031
Wherein n = pq, g is less than n 2 The random number of (2); private key
Figure BDA0003786993380000032
Wherein α = lcm (p-1, q-1),
Figure BDA0003786993380000033
in addition, the trusted center TA is an authenticated user U i Symmetric encryption key generation based on symmetric encryption algorithm AES
Figure BDA0003786993380000034
(2) Firstly, the trusted center TA is the authenticated user U i Generating a random invertible matrix and its inverse M, M -1 ∈Z 2d ×2d Where d is the dimension of the feature vector; then, toAt each authenticated user U i The trusted center TA generates two random matrices
Figure BDA0003786993380000035
As an authentication key, wherein
Figure BDA0003786993380000036
Finally, for each registered user R i The trusted center TA generates two random matrices
Figure BDA0003786993380000037
Constructing the key as an index, wherein
Figure BDA0003786993380000038
The encryption characteristic stage comprises:
(1) Obtaining N M-dimensional vectors by extracting human face and fingerprint characteristics
Figure BDA00037869933800000314
And an n-dimensional vector v f (ii) a Defining operations
Figure BDA0003786993380000039
The calculation formula is as follows:
Figure BDA00037869933800000310
the obfuscated biometric templates obtained were as follows:
Figure BDA00037869933800000311
(2) The extractor is first operated at v B Randomly selects m from each vector 1 (m 1 Belongs to M) numbers, and obtains data of relevant subscripts in each vector to construct a feature candidate vector v ″ i (i =1, \8230;, N), a randomly generated subscript defined as the user's registration key
Figure BDA00037869933800000312
The extractor connects the feature candidate vectors based on the 'string connection' operation to construct a d-vitamin feature registration vector, and the calculation formula is as follows:
v R =v″ 1 ||v″ 2 ||…||v″ N
(3) Extractor at v B Randomly selects m in each vector 2 (m 2 E.m) numbers, randomly generated subscript being defined as the user's template key
Figure BDA00037869933800000313
Obtaining data of related subscript in each vector to construct biological characteristic template T i The calculation formula is as follows:
Figure BDA0003786993380000041
(4) The extractor uses the public key of the homomorphic encryption algorithm Paillier to encrypt the biological characteristic template T i The encryption formula is as follows:
Figure BDA0003786993380000042
the index generation stage comprises:
(1) First, the extractor expands each registration vector
Figure BDA0003786993380000043
To
Figure BDA0003786993380000044
The expansion formula is as follows:
Figure BDA0003786993380000045
wherein
Figure BDA0003786993380000046
Is that the extractor is for each registration vector
Figure BDA0003786993380000047
A randomly selected number;
(2) The extractor then uses the registration key
Figure BDA0003786993380000048
Encryption
Figure BDA0003786993380000049
The encryption formula is as follows:
Figure BDA00037869933800000410
wherein the content of the first and second substances,
Figure BDA00037869933800000411
p 1 >>p 2 and gamma is>>2|max(ε i )|,
Figure BDA00037869933800000412
Defined as an integer confusion vector randomly selected from a probability distribution;
Figure BDA00037869933800000413
is formed by a registration vector
Figure BDA00037869933800000414
A composed ciphertext; extractor with tuples
Figure BDA00037869933800000415
In the form of
Figure BDA00037869933800000416
And
Figure BDA00037869933800000417
from registered user R i Transmitting to a computing server CS; when the computing server CS receives allWhen registering the encryption primitive ancestor of the user, an encryption index is created
Figure BDA00037869933800000418
Wherein U is max Representing the total number of users in the database DB; the encryption index I will be transmitted by the calculation server CS to the database DB for storage.
The token generation phase comprises:
(1) First, the extractor authenticates the user U from the certificate j Extracting a feature vector v from the biological features A And has a registration key
Figure BDA00037869933800000419
And template key
Figure BDA00037869933800000420
Biological characteristic template T A
(2) The extractor then expands the feature vector v A To v' A The expansion formula is as follows:
Figure BDA00037869933800000421
wherein
Figure BDA00037869933800000422
The extractor is an authenticated user U j To authenticate a randomly selected number, needs to pay attention to η j Is a positive number;
(3) Next, the extractor uses the authenticated user U j Authentication key of
Figure BDA0003786993380000051
To spread vector v' A Encryption is carried out, and an encryption formula is as follows:
Figure BDA0003786993380000052
wherein
Figure BDA0003786993380000053
Is an integer confusion vector randomly selected by the extractor; the extractor will encrypt the authentication query Q A Sends it to the computing server CS, and then sends an authentication query Q A Sending the data to a database DB for authentication;
(4) Extractor use authentication user U j The public key of the homomorphic encryption algorithm Paillier
Figure BDA0003786993380000054
Template T for biological characteristics A Encrypting to obtain ciphertext
Figure BDA0003786993380000055
In addition to this, the extractor uses an authenticated user U j Symmetric key of (2)
Figure BDA0003786993380000056
To biological characteristic template T A Encrypt to obtain ciphertext E K (T A ) (ii) a The extractor will
Figure BDA0003786993380000057
And E K (T A ) And sending the result to a computing server CS for Euclidean distance computation of subsequent ciphertexts.
The authentication phase includes:
the authentication process includes three steps: first, the database DB receives the encryption index I and the authentication query Q A Carrying out transformation; the database DB then stores the encryption index according to it
Figure BDA0003786993380000058
Juicing each enrollment template and authentication query Q A Similarity between them; finally, the database DB sends the set of candidate templates to the computation server CS for use by the computation server CS with the set of candidate templates and the ciphertext
Figure BDA0003786993380000059
Correlated feature templates to compute Euclidean distance between the twoA distance; the specific process is as follows:
(1) The database DB pairs the encryption index received from the extractor
Figure BDA00037869933800000510
Each of which
Figure BDA00037869933800000511
Carrying out transformation; the database DB then re-matches the authentication query Q received from the extractor A And performing transformation, wherein the transformation formula is as follows:
Figure BDA00037869933800000512
Figure BDA00037869933800000513
(2) Database DB computation-transformed queries
Figure BDA00037869933800000514
And each encrypted item in the index I
Figure BDA00037869933800000515
The correlation score of (c) is calculated as follows:
Figure BDA00037869933800000516
Figure BDA0003786993380000061
wherein
Figure BDA0003786993380000062
Is the random number part of the similarity score, eliminated
Figure BDA00037869933800000616
And
Figure BDA00037869933800000617
these two parts are used to obtain the calculation result of the above formula;
according to the calculation result, the database DB obtains the nearest k index entries, sends the corresponding biological characteristic template set to the calculation server CS, and the calculation server CS calculates the ciphertext template
Figure BDA0003786993380000063
And euclidean distances between k candidate templates;
(3) Computing server CS uses authenticated user U i Symmetric key of (2)
Figure BDA0003786993380000064
For ciphertext E K (T A ) Decrypting to obtain the biometric template
Figure BDA0003786993380000065
Then, calculate
Figure BDA0003786993380000066
And candidate templates
Figure BDA0003786993380000067
The euclidean distance between them, the calculation formula is as follows:
Figure BDA0003786993380000068
if the Euclidean distance in the above equation is computed from its additive homomorphism under the homomorphic encryption algorithm Paillier, the computation result is as follows:
Figure BDA0003786993380000069
for the
Figure BDA00037869933800000610
And
Figure BDA00037869933800000611
these two parts, using additive homomorphism, are converted to the following equation:
Figure BDA00037869933800000612
Figure BDA00037869933800000613
for
Figure BDA00037869933800000614
This section, using additive homomorphism, converts it into the following equation:
Figure BDA00037869933800000615
the computing server CS will
Figure BDA0003786993380000071
Conversion is carried out, and the conversion formula is as follows:
Figure BDA0003786993380000072
having plaintext, ciphertext templates T in the computing server CS A
Figure BDA0003786993380000073
And on the premise of the encrypted candidate template set, the computing server CS checks the ciphertext template
Figure BDA0003786993380000074
And the Euclidean distance of each candidate template, the minimum Euclidean distance in the resultSeparation device
Figure BDA0003786993380000075
Whether a set threshold T is met; if the value is smaller than the set threshold value T, the computing server CS considers that the authentication is passed; otherwise, the computing server CS considers that the authentication has failed.
The feature updating stage comprises:
the system supports three update operations: adding, deleting and modifying, namely registering a new user, canceling an existing user and updating an existing user key and a feature template based on a revocable template module, the specific process is as follows:
(1) New user U ADD Uploading own biological characteristic data through an extractor, processing the biological characteristic data by the extractor, and respectively generating encrypted registration vectors
Figure BDA0003786993380000076
And encrypted feature templates
Figure BDA0003786993380000077
The extractor will
Figure BDA0003786993380000078
To a calculation server CS which sends it to a database DB which will
Figure BDA0003786993380000079
Adding to the stored index to complete the registration of the new user;
(2) The existing user revocation process requires three operations; first, the extractor collects and extracts the user U to be revoked DEL The biological characteristics of (a); in addition, the extractor utilizes a registration key
Figure BDA00037869933800000710
Generating matching index entries
Figure BDA00037869933800000711
The extractor then indexes the entry
Figure BDA00037869933800000712
Sending the data to a computing server CS, and sending the data to a database DB by the computing server CS; finally, the database DB deletes the index entry on the index it stores
Figure BDA00037869933800000713
And matched encryption template
Figure BDA00037869933800000714
(3) When the user U i When the biological template is damaged or stolen, the user U i Re-inputting the biological characteristics based on the template module which can be cancelled; first, an extractor extracts a user biometric feature and obtains a registration index item
Figure BDA00037869933800000715
And an encryption template
Figure BDA00037869933800000716
In addition, the extractor generates new enrollment and template keys
Figure BDA00037869933800000717
And
Figure BDA00037869933800000718
then, the extractor will
Figure BDA00037869933800000719
And
Figure BDA00037869933800000720
sending the data to a computing server CS, and sending the data to a database DB by the computing server CS; finally, the database DB utilizes the index entries
Figure BDA00037869933800000721
Dematching encryption index I with user U i Related indexing item
Figure BDA00037869933800000722
Deleting an index entry
Figure BDA00037869933800000723
And associated cryptographic templates
Figure BDA00037869933800000724
And will be
Figure BDA00037869933800000725
And
Figure BDA00037869933800000726
is inserted into the encryption index I and,
wherein, TA: a trusted center; CS: a computing server; DB: a database; u shape i 、U j : authenticating the user;
Figure BDA0003786993380000081
authenticating a user U i The public key of (a);
Figure BDA0003786993380000082
authenticating a user U i The private key of (a);
Figure BDA0003786993380000083
authenticating a user U i The symmetric encryption key of (a);
Figure BDA0003786993380000084
authenticating the key; r i : registering a user;
Figure BDA0003786993380000085
indexing and constructing a key; v. of B : a biometric template; v. of R : a biometric enrollment vector; t is i : a candidate template; paillier: a homomorphic encryption algorithm;
Figure BDA0003786993380000086
registering a vector;
Figure BDA0003786993380000087
expanded registration vectors; i: encrypting the index; v. of A : a feature vector; v' A : expanded feature vectors; t is a unit of A : a biometric template; q A : authenticating and inquiring;
Figure BDA0003786993380000088
a Euclidean distance; AES: a symmetric encryption algorithm; m: a random invertible matrix; m -1 : an inverse matrix of M; m is 1 、m 2 : a random number; v ″) i : a feature candidate vector;
Figure BDA0003786993380000089
registered user R i The registration key of (2);
Figure BDA00037869933800000810
a template key;
Figure BDA00037869933800000811
biometric template T i An encrypted form of (a);
Figure BDA00037869933800000812
registration vector
Figure BDA00037869933800000813
An encrypted form of (a); u shape max : total number of users in database DB;
Figure BDA00037869933800000814
biological characteristic template T A A homomorphic form of encryption of (a); e K (T A ): biological characteristic template T A A symmetric encryption form of (a);
Figure BDA00037869933800000815
authenticating a user U j The symmetric key of (a);
Figure BDA00037869933800000816
a transformed query; u shape ADD : a new user;
Figure BDA00037869933800000817
new user U ADD An encrypted registration vector;
Figure BDA00037869933800000818
new user U ADD An encrypted feature template; u shape DEL : a user to be revoked;
Figure BDA00037869933800000819
user U to be revoked DEL The registration key of (2);
Figure BDA00037869933800000820
and user U to be revoked DEL Matching index entries;
Figure BDA00037869933800000821
and the user U to be revoked DEL A matched encryption template;
Figure BDA00037869933800000822
user U i A new registration index entry;
Figure BDA00037869933800000823
user U i A new encrypted template;
Figure BDA00037869933800000824
user U i A new registration key;
Figure BDA00037869933800000825
user U i A new template key;
Figure BDA00037869933800000826
newly defined vector operations; l |: character string connection operation; sigma: performing accumulation operation; II: and (4) performing continuous multiplication operation.
A lightweight biometric authentication method based on joint biometric authentication is stored in a program storage medium receiving user input, and is executed by an electronic device through a computer program.
The lightweight biometric authentication method based on the joint biometric identification is realized by adopting a lightweight biometric authentication system, and the lightweight biometric authentication system comprises the following steps:
the extractor is used for extracting biological characteristics, generating a template module which can be cancelled and encrypting a template;
the trusted center is used for generating a key;
a calculation server for calculating a euclidean distance of the encrypted biometric feature;
and the database is used for storing the indexes.
The lightweight biometric authentication system is carried on a terminal, and the terminal is an Internet of things terminal.
The invention has the beneficial effects that: the invention uses the newly proposed random bit generation RBG and encryption process to construct the biological characteristic template and the related index, thus protecting the privacy of the outsourced stored biological characteristic template and the confidentiality of the identity authentication process; after the extractor extracts the authentication template, the random bit generation RBG and the matrix key are used for carrying out confusion and encryption on the template to obtain a token, so that the safety of the whole authentication process and the query non-connectability can be ensured; in the authentication matching process, a matching set close to the token is screened out, then the similarity between the authentication template and the template in the matching set is compared one by one, and the similarity calculation is executed based on a newly proposed encryption vector distance calculation method, so that the authentication process has strong robustness and the authentication accuracy can be ensured; the method of the present invention achieves greater safety and accuracy at less cost.
The invention adopts an encryption process based on low cost and random bit generation to construct a biological characteristic template and a related index, and a user generates and acquires a key from the random bit as an identity authentication password, which is the basis for realizing joint knowledge and biological characteristic identity authentication subsequently; after the extractor extracts the authentication template, the template is obfuscated and encrypted by using random bit generation and a matrix key to obtain a token, a retrieval method based on the token and the encryption index is designed by using a searchable encryption technology, k template indexes closest to the authentication template are retrieved, and the safety of the whole authentication process and the non-connectability of inquiry can be ensured; the invention provides a biological characteristic template construction method combining a human face and a fingerprint, which uses local binary characteristic LBP and fingerprint characteristics based on details, screens out a matching set close to a token in an authentication process, compares the similarity between the authentication template and the template in the matching set one by one, and executes similarity calculation based on a newly-proposed encryption vector distance calculation method, so that the authentication process has strong robustness and the authentication accuracy can be ensured. The invention meets the requirements of confidentiality, renewability, revocable property, irreversibility and non-connectability of the template in the biological characteristic identification, and realizes the balance between low cost of the biological characteristic and high safety identification.
The invention is compared with the classical biological authentication method. The safety comparison results are shown in table 1, wherein "√" indicates that the safety requirement is satisfied, "×" indicates that the safety requirement is not satisfied, and "+" indicates that the safety requirement is partially satisfied.
TABLE 1 comparison of safety
Figure BDA0003786993380000091
Figure BDA0003786993380000101
In table 1, the method of the present invention has renewability and revocable properties that other classical biometric authentication methods do not have; the method of Zhu et al has verifiability and collusion resistance, but inevitably results in high overhead due to the introduction of bilinear pairing in the method, making the method unsuitable for mobile devices. The method of the invention realizes the balance between the requirements of low cost and high safety of the biological authentication.
Drawings
Fig. 1 is a flowchart of a lightweight biometric authentication method according to an embodiment of the present invention.
Fig. 2 is a system block diagram of a lightweight biometric authentication system according to an embodiment of the present invention.
Fig. 3 is a flowchart of an implementation of the lightweight biometric authentication method according to the embodiment of the present invention.
Fig. 4, 5 and 6 are graphs comparing authentication accuracy and authentication time in different databases (ORL, yale and FERET databases) for the lightweight biometric authentication method according to the embodiment of the present invention and other classical biometric authentication methods.
Fig. 7, fig. 8 and fig. 9 are simulation diagrams of the authentication accuracy of the LBP feature descriptor dimension under different databases (ORL, yale and FERET databases) in the lightweight biometric authentication method according to the embodiment of the present invention.
Fig. 10 is a comparison graph of the time overhead of generating a key and generating a token under different feature vector sizes in the lightweight biometric authentication method and other classical biometric authentication methods according to the embodiment of the present invention.
Fig. 11 is a comparison graph of the time cost of index construction in the FERET database by the lightweight biometric authentication method according to the embodiment of the present invention and other classical biometric authentication methods.
Fig. 12 is a graph comparing the time overhead of a query in the FERET database by the lightweight biometric authentication method according to the embodiment of the present invention with other classical biometric authentication methods.
Fig. 13, 14 and 15 are graphs comparing the time overhead of encrypting vector calculation under different vector sizes and data amounts in the lightweight biometric authentication method according to the embodiment of the present invention and other classical biometric authentication methods.
Detailed Description
The present invention will be described in further detail with reference to the following examples and the accompanying drawings. It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
As shown in fig. 1, a lightweight biometric authentication method based on federated biometric identification includes the following steps:
s101: the trusted center TA generates a series of keys for authenticating the user U i Generating public keys
Figure BDA0003786993380000111
Private key
Figure BDA0003786993380000112
Symmetric encryption key
Figure BDA0003786993380000113
And authentication key
Figure BDA0003786993380000114
For registering a user R i Generating an index build key
Figure BDA0003786993380000115
S102: the extractor obfuscates the biometric template v B To construct a d-vitamin feature registration vector v R And a biometric template T i And encrypting the biological characteristic template T by using a public key of a homomorphic encryption algorithm Paillier i
S103: extractor extended registration vector
Figure BDA0003786993380000116
To
Figure BDA0003786993380000117
Using registration keys
Figure BDA0003786993380000118
Encryption
Figure BDA0003786993380000119
Will be provided with
Figure BDA00037869933800001110
Sending the index I to a computing server CS, encrypting the index I by the computing server CS and sending the index I to a database DB;
s104: extractor extended feature vector v A To v' A V 'to extended feature vector' A And a biometric template T A Is encrypted and will
Figure BDA00037869933800001111
And E K (T A ) Sending to a computing server CS;
s105: the database DB receives the encryption index I and the authentication query Q A Transforming, computing each enrollment template and authentication query Q A The similarity between the candidate templates is sent to the computing server CS so that the computing server CS can compute the Euclidean distance
Figure BDA00037869933800001112
S106: three update operations are supported: additions, deletions, and modifications, i.e., new user registration, existing user revocation, and updates of existing user keys and feature templates based on the revocable template module.
As shown in fig. 2, the lightweight biometric authentication method based on joint biometric identification is implemented by using a lightweight biometric authentication system, and the lightweight biometric authentication system includes:
an extractor: as a completely trusted entity in the system, the extractor has sufficient computing power but no large storage space, and is mainly responsible for extracting the biological features, generating a multi-mode revocable template together with the trusted center, and encrypting the template according to a key distributed by the trusted center;
the credible center: the device is responsible for assisting the extractor to generate a multi-mode revocable template and generating different template encryption keys for different users;
a computing server: the system is provided with a plurality of credible computing servers, each computing server provides service for all users in a system subregion by using strong computing capacity, and the computing servers are responsible for calculating the Euclidean distance of encrypted biological characteristics and returning a final authentication result according to the computing results between a candidate template set and an authentication template;
a database: as an entity with the strongest computing power and storage space in the system, the distributed database can store biological characteristic templates of a plurality of users, and associates the user identity with the characteristic templates by establishing an encrypted query index; the database is a semi-trusted entity that will fully execute instructions and perform statistical analysis on stored information.
As shown in fig. 3, the lightweight biometric authentication method based on joint biometric identification includes a key generation phase, a feature encryption phase, an index generation phase, a token generation phase, an authentication phase, and a feature update phase;
the key generation phase comprises the following steps:
(1) The trusted center TA is a user U i Generating two large prime numbers p and q, and generating a public key based on a homomorphic encryption algorithm Paillier
Figure BDA0003786993380000121
Wherein n = pq, g is less than n 2 The random number of (2); private key
Figure BDA0003786993380000122
Wherein α = lcm (p-1, q-1),
Figure BDA0003786993380000123
in addition, the trusted center TA is an authenticated user U i Symmetric encryption key generation based on symmetric encryption algorithm AES
Figure BDA00037869933800001210
(2) Firstly, the trusted center TA is the authenticated user U i Generating a random invertible matrix and its inverse M, M -1 ∈Z 2d ×2d Where d is the dimension of the feature vector; then, for each authenticated user U i The trust center TA generates two random matrices
Figure BDA0003786993380000124
As an authentication key, among
Figure BDA0003786993380000125
Finally, for each registered user R i The trusted center TA generates two random matrices
Figure BDA0003786993380000126
Constructing the key as an index, wherein
Figure BDA0003786993380000127
The encryption characteristic stage comprises:
(1) Through face and fingerprint feature extraction, N M-dimensional vectors can be obtained
Figure BDA0003786993380000128
And an n-dimensional vector v f (ii) a Defining operations
Figure BDA0003786993380000129
The calculation formula is as follows:
Figure BDA0003786993380000131
the obfuscated biometric templates obtained were as follows:
Figure BDA0003786993380000132
(2) The extractor is first operated at v B Randomly selects m from each vector 1 (m 1 Belongs to M) numbers, and obtains data of relevant subscripts in each vector to construct a feature candidate vector v ″ i (i =1, \8230;, N), a randomly generated subscript is defined as the user's registration key
Figure BDA0003786993380000133
The extractor connects the feature candidate vectors based on the 'string connection' operation to construct a d-vitamin feature registration vector, and the calculation formula is as follows:
v R =v″ 1 ||v″ 2 ||…||v″ N
(3) Extractor at v B Randomly selects m from each vector 2 (m 2 E.m) numbers, randomly generated subscript being defined as the user's template key
Figure BDA00037869933800001319
Obtaining data of related subscript in each vector to construct biological feature template T i The calculation formula is as follows:
Figure BDA0003786993380000134
(4) The extractor uses the public key of the homomorphic encryption algorithm Paillier to encrypt the biological characteristic template T i The encryption formula is as follows:
Figure BDA0003786993380000135
the index generation stage comprises:
(1) First, the extractor expands each registration vector
Figure BDA0003786993380000136
To
Figure BDA0003786993380000137
The expansion formula is as follows:
Figure BDA0003786993380000138
wherein
Figure BDA0003786993380000139
Is that the extractor is for each registration vector
Figure BDA00037869933800001310
A randomly selected number;
(2) The extractor then uses the registration key
Figure BDA00037869933800001311
Encryption
Figure BDA00037869933800001312
The encryption formula is as follows:
Figure BDA00037869933800001313
wherein the content of the first and second substances,
Figure BDA00037869933800001314
p 1 >>p 2 and gamma is>>2|max(ε i )|,
Figure BDA00037869933800001315
Defined as an integer confusion vector randomly selected from a probability distribution; in the subsequent authentication phase, the above parameters will be used for vector similarity calculation;
Figure BDA00037869933800001316
is formed by a registration vector
Figure BDA00037869933800001317
A composed ciphertext; extractor with tuples
Figure BDA00037869933800001318
In the form of
Figure BDA0003786993380000141
And
Figure BDA0003786993380000142
from registered user R i Transmitting to a computing server CS; when the computing server CS receives the encrypted metaprogenitors of all registered users, an encryption index will be created
Figure BDA0003786993380000143
Wherein U is max Representing the total number of users in the database DB; the encryption index I will be transmitted by the calculation server CS to the database DB for storage.
The token generation phase comprises:
(1) First, the extractor authenticates the user U from j Extracting a feature vector v from the biological features A And has a registration key
Figure BDA0003786993380000144
And template key
Figure BDA0003786993380000145
Biological characteristic template T A
(2) The extractor then expands the feature vector v A To v' A The expansion formula is as follows:
Figure BDA0003786993380000146
wherein
Figure BDA0003786993380000147
The extractor is an authenticated user U j To authenticate the randomly selected number, needs to pay attention to eta j Is a positive number;
(3) Next, the extractor uses the authenticated user U j Authentication key of
Figure BDA0003786993380000148
To extension vector v' A Encryption is carried out, and an encryption formula is as follows:
Figure BDA0003786993380000149
wherein
Figure BDA00037869933800001410
Is an integer confusion vector randomly selected by the extractor; the extractor will encrypt the authentication query Q A Send it to the calculation server CS and then send the authentication query Q A Sending the data to a database DB for authentication;
(4) Extractor use authentication user U j The public key of the homomorphic encryption algorithm Paillier
Figure BDA00037869933800001411
Template T for biological characteristics A To add are carried outEncrypting to obtain a ciphertext
Figure BDA00037869933800001412
In addition, the extractor uses the authenticated user U j Symmetric key of
Figure BDA00037869933800001413
Template T for biological characteristics A Encrypt to obtain ciphertext E K (T A ) (ii) a The extractor will
Figure BDA00037869933800001414
And E K (T A ) And sending the result to a computing server CS for Euclidean distance computation of subsequent ciphertexts.
The authentication phase includes:
the authentication process includes three steps: first, the database DB receives the index I and the authentication query Q A Carrying out conversion; the database DB then stores the encryption index according to it
Figure BDA00037869933800001415
Computing each enrollment template and authentication query Q A Similarity between them; finally, the database DB sends the set of candidate templates to the computation server CS for the computation server CS to use with the set of candidates and the ciphertext
Figure BDA00037869933800001416
The related characteristic template is used for calculating the Euclidean distance between the two characteristic templates; the specific process is as follows:
(1) The database DB pairs the encryption index received from the extractor
Figure BDA0003786993380000151
Each of which is
Figure BDA0003786993380000152
Carrying out transformation; the database DB then re-processes the authentication query Q received from the extractor A And performing transformation, wherein the transformation formula is as follows:
Figure BDA0003786993380000153
Figure BDA0003786993380000154
(2) Database DB computation-transformed queries
Figure BDA0003786993380000155
And each encrypted item in the encryption index I
Figure BDA0003786993380000156
The formula for calculating the relevance score is as follows:
Figure BDA0003786993380000157
wherein
Figure BDA0003786993380000158
Is the random number part of the similarity score, note that p is due to 1 >>p 2 And is
Figure BDA0003786993380000159
Therefore, it is not only easy to use
Figure BDA00037869933800001510
And
Figure BDA00037869933800001511
the values of these two parts approach 0 indefinitely; since the calculation result is in the domain
Figure BDA00037869933800001512
Upper round off, thus can eliminate
Figure BDA00037869933800001513
And
Figure BDA00037869933800001514
these two parts are used to obtain the calculation result of the above formula;
according to the calculation result, the database DB obtains the nearest k index entries, sends the corresponding biological characteristic template set to the calculation server CS, and the calculation server CS calculates the ciphertext template
Figure BDA00037869933800001515
And euclidean distances between k candidate templates;
(3) Computing server CS uses authenticated user U i Symmetric key of
Figure BDA00037869933800001516
For ciphertext E K (T A ) Decrypting to obtain the biometric template
Figure BDA00037869933800001517
Then, calculate
Figure BDA00037869933800001518
And candidate templates
Figure BDA00037869933800001519
The euclidean distance between them, the calculation formula is as follows:
Figure BDA0003786993380000161
if the Euclidean distance in the above equation is computed from its additive homomorphism under the homomorphic encryption algorithm Paillier, then the computation result is as follows:
Figure BDA0003786993380000162
for
Figure BDA0003786993380000163
And
Figure BDA0003786993380000164
these two parts can be homomorphically converted into the following equation by addition, and the conversion equation is as follows:
Figure BDA0003786993380000165
Figure BDA0003786993380000166
for the
Figure BDA0003786993380000167
This section, it can be converted using additive homomorphism into the following equation:
Figure BDA0003786993380000168
due to the above conversion formula, the calculation server CS will
Figure BDA0003786993380000169
Conversion is carried out, and the conversion formula is as follows:
Figure BDA00037869933800001610
having plaintext, ciphertext templates T in the computing server CS A
Figure BDA00037869933800001611
And the encrypted candidate template set, the computing server CS may check the ciphertext template
Figure BDA00037869933800001612
And the Euclidean distance of each candidate template, the minimum Euclidean distance in the result
Figure BDA00037869933800001613
Whether a set threshold T is met; if the value is smaller than the set threshold value T, the computing server CS considers that the authentication is passed; otherwise, the computing server CS considers the authentication as failed.
The feature updating stage comprises:
the system supports three update operations: additions, deletions, and modifications, i.e., new user registration, existing user revocation, and updates of existing user keys and feature templates based on the revocable template module. The specific process is as follows:
(1) New user U ADD Uploading own biological characteristic data through an extractor, and processing the biological characteristic data by the extractor to respectively generate encrypted registration vectors
Figure BDA0003786993380000171
And encrypted feature templates
Figure BDA0003786993380000172
The extractor will
Figure BDA0003786993380000173
To a calculation server CS which sends it to a database DB which will
Figure BDA0003786993380000174
Adding the new user into the stored encryption index to complete the registration of the new user;
(2) The existing user revocation process requires three operations; first, the extractor collects and extracts the user U to be revoked DEL The biological characteristic of (a); in addition, the extractor utilizes the registration key
Figure BDA0003786993380000175
Generating matching index entries
Figure BDA00037869933800001737
The extractor then indexes the entry
Figure BDA0003786993380000176
Sending the data to a computing server CS, and sending the data to a database DB by the computing server CS; finally, the database DB deletes the index entry on the index it stores
Figure BDA0003786993380000177
And matched encryption template
Figure BDA0003786993380000178
(3) When the user U i When the biological template is damaged or stolen, the user U i The biometric may be re-entered based on the dismissible template module; first, an extractor extracts a user biometric feature and obtains a registration index item
Figure BDA0003786993380000179
And an encryption template
Figure BDA00037869933800001710
In addition, the extractor generates new enrollment and template keys
Figure BDA00037869933800001711
And
Figure BDA00037869933800001712
then, the extractor will
Figure BDA00037869933800001713
And
Figure BDA00037869933800001714
sending the data to a computing server CS, and sending the data to a database DB by the computing server CS; finally, the database DB utilizes the index entry
Figure BDA00037869933800001715
Dematching index I with user U i Related index item
Figure BDA00037869933800001716
Deleting an index entry
Figure BDA00037869933800001717
And associated cryptographic templates
Figure BDA00037869933800001718
And will be
Figure BDA00037869933800001719
And
Figure BDA00037869933800001720
inserted into the encryption index I.
Wherein, TA: a trusted center; CS: a computing server; DB: a database; u shape i 、U j : authenticating a user;
Figure BDA00037869933800001721
authenticating a user U i The public key of (2);
Figure BDA00037869933800001722
authenticating a user U i The private key of (1);
Figure BDA00037869933800001723
authenticating a user U i The symmetric encryption key of (a);
Figure BDA00037869933800001724
authenticating the key; r i : registering a user;
Figure BDA00037869933800001725
indexing and constructing a key; v. of B : a biometric template; v. of R : a biometric enrollment vector; t is a unit of i : a candidate template; paillier: a homomorphic encryption algorithm;
Figure BDA00037869933800001726
registering a vector;
Figure BDA00037869933800001727
expanded registration vectors; i: encrypting the index; v. of A : a feature vector; v' A : expanded feature vectors; t is A : a biometric template; q A : authenticating and inquiring;
Figure BDA00037869933800001728
a Euclidean distance; AES: a symmetric encryption algorithm; m: a random invertible matrix; m is a group of -1 : an inverse matrix of M; m is 1 、m 2 : a random number; v ″', and i : a feature candidate vector;
Figure BDA00037869933800001729
registered user R i The registration key of (2);
Figure BDA00037869933800001730
a template key;
Figure BDA00037869933800001731
biometric template T i An encrypted form of (a);
Figure BDA00037869933800001732
registration vector
Figure BDA00037869933800001733
An encrypted form of (a); u shape max : total number of users in database DB;
Figure BDA00037869933800001734
biological characteristic template T A A homomorphic form of encryption of (a); e K (T A ): biological characteristic template T A A symmetric encryption form of (a);
Figure BDA00037869933800001735
authenticating a user U j The symmetric key of (2);
Figure BDA00037869933800001736
a transformed query; u shape ADD : a new user;
Figure BDA0003786993380000181
new user U ADD An encrypted registration vector;
Figure BDA0003786993380000182
new user U ADD An encrypted feature template; u shape DEL : a user to be revoked;
Figure BDA0003786993380000183
user U to be revoked DEL The registration key of (2);
Figure BDA0003786993380000184
and user U to be revoked DEL Matching index entries;
Figure BDA0003786993380000185
and user U to be revoked DEL A matched encryption template;
Figure BDA0003786993380000186
user U i A new registration index entry;
Figure BDA0003786993380000187
user U i A new encrypted template;
Figure BDA0003786993380000188
user U i A new registration key;
Figure BDA0003786993380000189
user U i A new template key;
Figure BDA00037869933800001810
newly defined vector operations; l |: character string connection operation; sigma: performing accumulation operation; II: and (4) performing continuous multiplication operation.
In order to verify the usability of the present invention, the following shows and describes the test results of the lightweight biometric authentication method SELBA based on joint biometric identification under simulation, the simulation environment: in a PC with a CPU of 2.10 GHz, the environment is Windows.
Fig. 4, 5, and 6 are graphs comparing the authentication accuracy and the authentication time of the lightweight biometric authentication method SELBA based on joint biometrics with those of other classical biometric authentication methods in different databases (ORL, yale, and FERET databases). The results show that the accuracy of the method of the invention in different databases is lower than that of the CNN-based method and higher than that of the Gabor-based and PCA-based methods. When the data volume in different databases reaches a certain degree, the authentication accuracy of the method can be stabilized to be more than 95%. Under different approaches, the time consumption will increase linearly with increasing amount of data. The time consumption of the method of the invention is slightly higher than that of the Gabor-based and PCA-based methods, but the time consumption of the CNN-based method is about four times that of the other methods. High accuracy methods entail high overhead, and although CNN-based methods are the most accurate, applications on mobile devices need to consider the accuracy and efficiency of identity authentication. Compared with other methods, the method of the invention realizes the balance between low authentication cost and high security requirements.
Fig. 7, 8 and 9 are simulations of the influence of the dimension of the LBP feature descriptor in the joint biometric identification-based lightweight biometric authentication method SELBA on the authentication accuracy of different data volumes under different databases (ORL, yale and FERET databases). The result shows that the larger the data amount is, the higher the recognition accuracy is in different databases. Further, the larger the dimensionality of the descriptor, the higher the recognition accuracy. As can be seen from fig. 7, 8, and 9, the recognition rate of the 3 × 3 dimensional descriptor is higher than that of the 8 × 6 dimensional descriptor by 10% or more. According to the simulation result, compared with the other three methods, the method provided by the invention keeps higher identity authentication accuracy on the basis of protecting the biological data privacy, and does not cause larger additional calculation overhead.
Fig. 10 is a time comparison of the lightweight biometric authentication method SELBA based on joint biometric identification with other classical biometric authentication methods for generating keys and tokens at different feature vector sizes. The results show that the time cost of generating the key by the inventive method and the method of Zhu et al increases linearly with increasing vector size. When the vector size is 16 bits, the average time to create the key is approximately 110 milliseconds and 290 milliseconds, respectively. When the size is increased to 256 bits, their average time overhead will increase to 1100ms and 1253ms, respectively. However, for the method of Zhou et al, the average time cost increases from 100ms to 2300ms and shows an exponential growth trend as the vector size increases from 16 bits to 256 bits. While the method of Zhou et al uses a matrix as the key, the matrix size will vary in synchronism with the vector size, the method of the present invention and the method of Zhu et al are based on homomorphic encryption, so the key size may not be affected by the vector size. Furthermore, the time cost of generating tokens in the three methods also increases with increasing vector dimension, but the increase is much less than key generation. When the size is 16 bits, the average time to generate tokens by the inventive method, the Zhu et al method, and the Zhou et al method is about 30ms, 220ms, and 60ms, respectively. When the size is increased to 256 bits, the average time reaches around 150ms, 1200ms and 860ms, respectively. Due to bilinear pairing introduced by the method of Zhu et al, the cost is much higher than that of the other two methods in the token generation process. Simulation results show that the time cost for generating the key and the token is low, and the method has practical advantages compared with other biological authentication methods.
Fig. 11 is a time comparison of index construction in the FERET database for the lightweight biometric authentication method SELBA based on joint biometric identification and other classical biometric authentication methods. The index structures of the three methods are all inverted indexes, and the time cost of index construction linearly increases along with the increase of the training data volume. The average time overhead of the inventive method, the Zhu et al method and the Zhou et al method remained around 0.16s, 0.45s and 0.38s, respectively, when the training data amount was 200. As the amount of data increases to 1000, the cost increases to around 10, 12 and 9 seconds. Simulation results show that in practical application, the time overhead of index construction of the method is within an acceptable range.
Fig. 12 is a time comparison of a lightweight biometric authentication method SELBA based on federated biometrics with other classical biometric authentication methods queried in the FERET database. The query times for the method of the present invention, the method of Zhu et al, and the method of Zhou et al, increase exponentially with increasing vector size. When the vector size is 16 bits, the influence of the variation of the training data on the query time cost is small, and when the vector size is 64 or 256 bits, the variation of the training data greatly affects the query overhead. However, smaller feature vector sizes do not describe features well. In a practical application scenario, setting the feature vector to 64 bits is a good choice to consider accuracy and efficiency. Simulation results show that compared with other methods, the method provided by the invention realizes balance between low-cost authentication and high-security requirements.
Fig. 13, 14 and 15 are time overhead comparisons of encryption vector calculations for different vector sizes and data amounts for the lightweight biometric authentication method SELBA based on joint biometrics and other classical biometric authentication methods. Fig. 13 and 14 show that the time overhead varies with an increase in the amount of data when the vector size is 16 bits and 64 bits, respectively. Among them, the method of Zhu et al is much more costly than the method of the present invention and the method of Zhou et al. This is mainly due to the fact that the computation process of the method of Zhu et al involves many linear pairing operations and requires verification of the validity of the token prior to computation. Figure 15 shows that the time cost of the inventive method and method of Zhou et al at different data volumes approaches Zhu et al gradually as the vector size increases to 256 bits. Simulation results show that compared with other methods, the method provided by the invention realizes balance between low authentication cost and high safety requirements.
It should be noted that the inventive method can be implemented by hardware, software, or a combination of software and hardware, and that the hardware portions can be implemented by dedicated logic; the software portions may be stored in a memory and executed by a suitable instruction execution system, such as a microprocessor or specially designed hardware. Those skilled in the art will appreciate that the apparatus and methods described above may be implemented using computer executable instructions and/or embodied in processor control code, such code being provided on a carrier medium such as a disk, CD-or DVD-ROM, programmable memory such as read only memory (firmware), or a data carrier such as an optical or electronic signal carrier, for example. The apparatus and its modules of the present invention may be implemented by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., or by software executed by various types of processors, or by a combination of hardware circuits and software, e.g., firmware.
The present invention is not limited to the above embodiments, and any modification, equivalent replacement and improvement made by those skilled in the art within the technical scope of the present invention, which is within the spirit and principle of the present invention, should be covered by the protection scope of the present invention.

Claims (10)

1. A lightweight biometric authentication method based on joint biometric identification is characterized by comprising the following steps:
s101: the trusted center TA generates a series of keys for authenticating the user U i Generating public keys
Figure FDA0003786993370000011
Private key
Figure FDA0003786993370000012
Symmetric encryption key
Figure FDA0003786993370000013
And an authentication key
Figure FDA0003786993370000014
For registering a user R i Generating an index build key
Figure FDA0003786993370000015
S102: extractor by obfuscating biometric templates v B To construct a d-vitamin profile registryQuantity v R And a biometric template T i And encrypting the biological characteristic template T by using a public key of a homomorphic encryption algorithm Paillier i
S103: extractor extended registration vector
Figure FDA0003786993370000016
To
Figure FDA0003786993370000017
Using registration keys
Figure FDA0003786993370000018
Encryption
Figure FDA0003786993370000019
Will be provided with
Figure FDA00037869933700000110
Sending the index I to a computing server CS, encrypting the index I by the computing server CS and sending the index I to a database DB;
s104: extractor extended feature vector v A To v' A For extended feature vector v' A And a biometric template T A Is encrypted and will
Figure FDA00037869933700000111
And E K (T A ) Sending to a computing server CS;
s105: the database DB receives the encryption index I and the authentication query Q A Transforming, computing each enrollment template and authentication query Q A The similarity between the candidate templates is sent to the computing server CS so that the computing server CS can compute the Euclidean distance
Figure FDA00037869933700000112
S106: three update operations are supported: addition, deletion, and modification, i.e., new user registration, existing user revocation, and updating of existing user keys and feature templates based on the revocable template module.
2. The method of claim 1, comprising a key generation phase, a feature encryption phase, an index generation phase, a token generation phase, an authentication phase, and a feature update phase;
the key generation phase comprises:
(1) The trusted center TA is an authenticated user U i Generating two large prime numbers p and q, and generating a public key based on a homomorphic encryption algorithm Paillier
Figure FDA00037869933700000113
Wherein n = pq, g is a random number less than n 2; private key
Figure FDA00037869933700000114
Wherein α = lcm (p-1, q-1),
Figure FDA00037869933700000115
in addition, the trusted center TA is an authenticated user U i Symmetric encryption key generation based on symmetric encryption algorithm AES
Figure FDA00037869933700000116
(2) Firstly, the trusted center TA is the authenticated user U i Generating a random invertible matrix and its inverses M, M -1 ∈Z 2d×2d Where d is the dimension of the feature vector; then, for each authenticated user U i The trusted center TA generates two random matrices
Figure FDA0003786993370000021
As an authentication key, wherein
Figure FDA0003786993370000022
Finally, for each registered user R i The trusted center TA generates two random matrices
Figure FDA0003786993370000023
Constructing the key as an index, wherein
Figure FDA0003786993370000024
3. The method of claim 2, wherein the encryption characterization phase comprises:
(1) Obtaining N M-dimensional vectors through face and fingerprint feature extraction
Figure FDA0003786993370000025
And an n-dimensional vector v f I =1, \ 8230;, N; defining operations
Figure FDA0003786993370000026
The calculation formula is as follows:
Figure FDA0003786993370000027
the obfuscated biometric templates obtained were as follows:
Figure FDA0003786993370000028
(2) The extractor is first operated at v B Randomly selects m in each vector 1 Number, m 1 E is M, and data of relevant subscripts in each vector are obtained to construct a characteristic candidate vector v i ", i =1, \ 8230;, N, randomly generated subscript defines the user's registration key
Figure FDA0003786993370000029
The extractor connects the feature candidate vectors based on the 'string connection' operation to construct a d-vitamin feature registration vector, and the calculation formula is as follows:
v R =v 1 ″||v 2 ″||…||v N
l |: character string connection operation;
(3) Extractor at v B Randomly selects m in each vector 2 Number m 2 Belongs to M, randomly generated subscript is defined as a template key of a user
Figure FDA00037869933700000210
Obtaining data of related subscript in each vector to construct biological feature template T i The calculation formula is as follows:
Figure FDA00037869933700000211
(4) The extractor encrypts the biological characteristic template Ti by using a public key of a homomorphic encryption algorithm Paillier, wherein an encryption formula is as follows:
Figure FDA00037869933700000212
4. the method of claim 3, wherein generating the index phase comprises:
(1) First, the extractor expands each registration vector
Figure FDA0003786993370000031
To
Figure FDA0003786993370000032
The expansion formula is as follows:
Figure FDA0003786993370000033
wherein
Figure FDA0003786993370000034
Is a liftExtractor for each registration vector
Figure FDA0003786993370000035
A randomly selected number; sigma: performing accumulation operation;
(2) The extractor then uses the registration key
Figure FDA0003786993370000036
Encryption
Figure FDA0003786993370000037
The encryption formula is as follows:
Figure FDA0003786993370000038
wherein, the first and the second end of the pipe are connected with each other,
Figure FDA0003786993370000039
p 1 >>p 2 and gamma is>>2|max(ε i )|,
Figure FDA00037869933700000310
Defined as an integer confusion vector randomly selected from a probability distribution;
Figure FDA00037869933700000311
is formed by a registration vector
Figure FDA00037869933700000312
A composed ciphertext; extractor with tuples
Figure FDA00037869933700000313
In the form of
Figure FDA00037869933700000314
And
Figure FDA00037869933700000315
from registered user R i Transmitting to a computing server CS; when the computing server CS receives the encrypted metanodes of all registered users, an encryption index will be created
Figure FDA00037869933700000316
Figure FDA00037869933700000317
Wherein U is max Representing the total number of users in the database DB; the encryption index I will be transmitted by the calculation server CS to the database DB for storage.
5. The method of claim 4, wherein the generating the token phase comprises:
(1) First, the extractor authenticates the user U from the certificate i Extracting a feature vector v from the biological features A And has a registration key
Figure FDA00037869933700000318
And template key
Figure FDA00037869933700000319
Biological characteristic template T A
(2) The extractor then expands the feature vector v A To v' A The expansion formula is as follows:
Figure FDA00037869933700000320
wherein
Figure FDA00037869933700000321
The extractor is an authenticated user U j To authenticate the randomly selected number, needs to pay attention to eta j Is a positive number;
(3) Next, the extractor uses the authenticated user U j Authentication key of
Figure FDA00037869933700000322
To extension vector v' A Encryption is carried out, and an encryption formula is as follows:
Figure FDA00037869933700000323
wherein
Figure FDA00037869933700000324
Is an integer confusion vector randomly selected by the extractor; the extractor will encrypt the authentication query Q A Sends it to the computing server CS, and then sends an authentication query Q A Sending the data to a database DB for authentication;
(4) Extractor use authentication user U j The public key of the homomorphic encryption algorithm Paillier
Figure FDA0003786993370000041
Template T for biological characteristics A Encrypting to obtain ciphertext
Figure FDA0003786993370000042
In addition, the extractor uses the authenticated user U j Symmetric key of (2)
Figure FDA0003786993370000043
To biological characteristic template T A Encrypt to obtain ciphertext E K (T A ) (ii) a The extractor will
Figure FDA0003786993370000044
And E K (T A ) And sending the result to a computing server CS for Euclidean distance computation of subsequent ciphertexts.
6. The method of claim 5, wherein the authentication process comprises three steps: first, the database DB receives the encryption index I and the authentication query Q A Carrying out conversion; the database DB then stores the encryption index according to it
Figure FDA0003786993370000045
Computing each enrollment template and authentication query Q A Similarity between them; finally, the database DB sends the set of candidate templates to the computation server CS for use by the computation server CS with the set of candidate templates and the ciphertext
Figure FDA0003786993370000046
The correlated characteristic template calculates the Euclidean distance between the two characteristic templates; the specific process is as follows:
(1) Database DB for encryption index received from extractor
Figure FDA0003786993370000047
Each of which is
Figure FDA0003786993370000048
Carrying out conversion; the database DB then re-matches the authentication query Q received from the extractor A And performing transformation, wherein the transformation formula is as follows:
Figure FDA0003786993370000049
Figure FDA00037869933700000410
(2) Database DB computation-transformed queries
Figure FDA00037869933700000411
And each encrypted item in the encryption index I
Figure FDA00037869933700000412
The formula for calculating the relevance score is as follows:
Figure FDA00037869933700000413
wherein
Figure FDA00037869933700000414
Is the random number part of the similarity score, eliminated
Figure FDA00037869933700000415
And
Figure FDA00037869933700000416
these two parts are used to obtain the calculation result of the above formula;
according to the calculation result, the database DB obtains the nearest k index entries, sends the corresponding biological characteristic template set to the calculation server CS, and the calculation server CS calculates the ciphertext template
Figure FDA0003786993370000051
And euclidean distances between the k candidate templates;
(3) Computing server CS uses authentication user U i Symmetric key of
Figure FDA0003786993370000052
For ciphertext E K (T A ) Decrypting to obtain the biological characteristic template
Figure FDA0003786993370000053
Then, calculate
Figure FDA0003786993370000054
And candidate templates
Figure FDA0003786993370000055
The euclidean distance between them, the calculation formula is as follows:
Figure FDA0003786993370000056
if the Euclidean distance in the above equation is computed from its additive homomorphism under the homomorphic encryption algorithm Paillier, then the computation result is as follows:
Figure FDA0003786993370000057
for
Figure FDA0003786993370000058
And
Figure FDA0003786993370000059
these two parts, using additive homomorphism, are converted to the following equation:
Figure FDA00037869933700000510
Figure FDA00037869933700000511
II: performing continuous multiplication operation;
for the
Figure FDA00037869933700000512
This section, using additive homomorphism, converts it into the following equation:
Figure FDA00037869933700000513
the computing server CS will
Figure FDA00037869933700000514
Conversion is carried out, and the conversion formula is as follows:
Figure FDA00037869933700000515
having plaintext, ciphertext templates T in the computing server CS A
Figure FDA00037869933700000516
And on the premise of the encrypted candidate template set, the computing server CS checks the ciphertext template
Figure FDA00037869933700000517
And the Euclidean distance of each candidate template, the minimum Euclidean distance in the result
Figure FDA0003786993370000061
Whether a set threshold T is met; if the value is smaller than the set threshold value T, the computing server CS considers that the authentication is passed; otherwise, the computing server CS considers the authentication as failed.
7. The method of claim 6, wherein the feature update phase comprises:
the system supports three update operations: adding, deleting and modifying, namely registering a new user, canceling an existing user and updating an existing user key and a feature template based on a revocable template module, the specific process is as follows:
(1) New user U ADD Uploading own biological characteristic data through an extractor, processing the biological characteristic data by the extractor, and respectively generating encrypted registration vectors
Figure FDA0003786993370000062
And encrypted feature templates
Figure FDA0003786993370000063
The extractor will
Figure FDA0003786993370000064
To the calculation server CS, which sends it to the database DB, which will
Figure FDA0003786993370000065
Adding the new user into the stored encryption index to complete the registration of the new user;
(2) The existing user revocation process requires three operations; first, the extractor collects and extracts the users U to be revoked DEL The biological characteristic of (a); in addition, the extractor utilizes the registration key
Figure FDA0003786993370000066
Generating matching index entries
Figure FDA0003786993370000067
The extractor then indexes the entry
Figure FDA0003786993370000068
Sending the data to a computing server CS, and sending the data to a database DB by the computing server CS; finally, the database DB deletes the index entry on the index it stores
Figure FDA0003786993370000069
And matched encryption template
Figure FDA00037869933700000610
(3) When the user U i When the biological template is damaged or stolen, the user U i Re-inputting the biological characteristics based on the template module which can be cancelled; first, an extractor extracts a user biometric feature and obtains a registration index item
Figure FDA00037869933700000611
And an encryption template
Figure FDA00037869933700000612
In addition, the extractor generates new enrollment and template keys
Figure FDA00037869933700000613
And
Figure FDA00037869933700000614
then, the extractor will
Figure FDA00037869933700000615
And
Figure FDA00037869933700000616
sending the data to a computing server CS, and sending the data to a database DB by the computing server CS; finally, the database DB utilizes the index entry
Figure FDA00037869933700000622
Dematching encryption index I with user U i Related indexing item
Figure FDA00037869933700000617
Deleting an index entry
Figure FDA00037869933700000618
And associated cryptographic templates
Figure FDA00037869933700000619
And will be
Figure FDA00037869933700000620
And
Figure FDA00037869933700000621
inserted into the encryption index I.
8. A storage medium for use in a method according to any of claims 1-7, wherein the program storage medium is stored for enabling an electronic device to execute via a computer program by receiving user input.
9. A lightweight biometric authentication system for use in the method of claims 1-8, wherein the lightweight biometric authentication system comprises:
the extractor is used for extracting biological characteristics, generating a template module which can be cancelled and encrypting a template;
a trusted center for generating a key;
a calculation server for calculating a euclidean distance of the encrypted biometric feature;
and the database is used for storing the indexes.
10. The system of claim 9, wherein the lightweight biometric authentication system is mounted on a terminal, and the terminal is an internet of things terminal.
CN202210945193.2A 2022-08-08 2022-08-08 Lightweight biometric authentication method and system based on joint biometric identification Pending CN115278673A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210945193.2A CN115278673A (en) 2022-08-08 2022-08-08 Lightweight biometric authentication method and system based on joint biometric identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210945193.2A CN115278673A (en) 2022-08-08 2022-08-08 Lightweight biometric authentication method and system based on joint biometric identification

Publications (1)

Publication Number Publication Date
CN115278673A true CN115278673A (en) 2022-11-01

Family

ID=83748315

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210945193.2A Pending CN115278673A (en) 2022-08-08 2022-08-08 Lightweight biometric authentication method and system based on joint biometric identification

Country Status (1)

Country Link
CN (1) CN115278673A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115913580A (en) * 2023-02-21 2023-04-04 杭州天谷信息科技有限公司 Homomorphic encryption-based biometric authentication method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150341349A1 (en) * 2014-05-23 2015-11-26 Fujitsu Limited Privacy-preserving biometric authentication
CN107919965A (en) * 2018-01-05 2018-04-17 杭州电子科技大学 A kind of biological characteristic sensitive information outsourcing identity identifying method based on homomorphic cryptography
CN108475309A (en) * 2015-08-21 2018-08-31 维尔蒂姆知识产权有限公司 System and method for biological characteristic consensus standard
CN112329519A (en) * 2020-09-21 2021-02-05 中国人民武装警察部队工程大学 Safe online fingerprint matching method
US20210124815A1 (en) * 2019-10-25 2021-04-29 Visa International Service Association Optimized private biometric matching
CN112733111A (en) * 2020-12-31 2021-04-30 暨南大学 Threshold predicate encryption biometric feature authentication method based on segment segmentation
CN113239336A (en) * 2021-06-02 2021-08-10 西安电子科技大学 Privacy protection biological characteristic authentication method based on decision tree

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150341349A1 (en) * 2014-05-23 2015-11-26 Fujitsu Limited Privacy-preserving biometric authentication
CN108475309A (en) * 2015-08-21 2018-08-31 维尔蒂姆知识产权有限公司 System and method for biological characteristic consensus standard
CN107919965A (en) * 2018-01-05 2018-04-17 杭州电子科技大学 A kind of biological characteristic sensitive information outsourcing identity identifying method based on homomorphic cryptography
US20210124815A1 (en) * 2019-10-25 2021-04-29 Visa International Service Association Optimized private biometric matching
CN112329519A (en) * 2020-09-21 2021-02-05 中国人民武装警察部队工程大学 Safe online fingerprint matching method
CN112733111A (en) * 2020-12-31 2021-04-30 暨南大学 Threshold predicate encryption biometric feature authentication method based on segment segmentation
CN113239336A (en) * 2021-06-02 2021-08-10 西安电子科技大学 Privacy protection biological characteristic authentication method based on decision tree

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
GOMEZ B M ET AL.: "Multi-biometric template protection based on homomorphic encryption", PATTERN RECOGNITION, 31 December 2017 (2017-12-31) *
张宁;臧亚丽;田捷;: "生物特征与密码技术的融合――一种新的安全身份认证方案", 密码学报, no. 02, 15 April 2015 (2015-04-15) *
杨雄;张晓惠;: "基于全同态加密的人脸特征密文认证系统", 微电子学与计算机, no. 09, 5 September 2020 (2020-09-05) *
王会勇;唐士杰;丁勇;王玉珏;李佳慧;: "生物特征识别模板保护综述", 计算机研究与发展, no. 05, 15 May 2020 (2020-05-15) *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115913580A (en) * 2023-02-21 2023-04-04 杭州天谷信息科技有限公司 Homomorphic encryption-based biometric authentication method and system

Similar Documents

Publication Publication Date Title
US20230325491A1 (en) Method and System for Securing User Access, Data at Rest and Sensitive Transactions Using Biometrics for Mobile Devices with Protected, Local Templates
US8842887B2 (en) Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device
Kaur et al. Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing
Yuan et al. Efficient privacy-preserving biometric identification in cloud computing
Zhu et al. An efficient and privacy-preserving biometric identification scheme in cloud computing
US8474025B2 (en) Methods and apparatus for credential validation
Leng et al. A remote cancelable palmprint authentication protocol based on multi‐directional two‐dimensional PalmPhasor‐fusion
Zhao et al. Negative iris recognition
Leng et al. Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Zhang et al. PTBI: An efficient privacy-preserving biometric identification based on perturbed term in the cloud
JP2000315999A (en) Cryptographic key generating method
JP2016508323A (en) Method for authenticating encrypted data and system for authenticating biometric data
Teoh et al. Cancellable biometrics and user-dependent multi-state discretization in BioHash
Torres et al. Effectiveness of fully homomorphic encryption to preserve the privacy of biometric data
CN116010917A (en) Privacy-protected image processing method, identity registration method and identity authentication method
ArunPrakash et al. Biometric encoding and biometric authentication (BEBA) protocol for secure cloud in m-commerce environment
Wang et al. A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system
Chen et al. A novel algorithm of fingerprint encryption using minutiae-based transformation
Lei et al. PRIVFACE: fast privacy-preserving face authentication with revocable and reusable biometric credentials
CN115278673A (en) Lightweight biometric authentication method and system based on joint biometric identification
Verma et al. A novel model to enhance the data security in cloud environment
CN114065169B (en) Privacy protection biometric authentication method and device and electronic equipment
Wang et al. Joint Biological ID: A Secure and Efficient Lightweight Biometric Authentication Scheme
Kaur et al. Remote multimodal biometric authentication using visual cryptography
Hernández-Álvarez et al. KeyEncoder: A secure and usable EEG-based cryptographic key generation mechanism

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination