CN101977197A - Multi-receiver encryption method based on biological characteristics - Google Patents

Multi-receiver encryption method based on biological characteristics Download PDF

Info

Publication number
CN101977197A
CN101977197A CN2010105280049A CN201010528004A CN101977197A CN 101977197 A CN101977197 A CN 101977197A CN 2010105280049 A CN2010105280049 A CN 2010105280049A CN 201010528004 A CN201010528004 A CN 201010528004A CN 101977197 A CN101977197 A CN 101977197A
Authority
CN
China
Prior art keywords
biological characteristic
encipherer
user
information
deciphering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010105280049A
Other languages
Chinese (zh)
Other versions
CN101977197B (en
Inventor
庞辽军
梁继民
田捷
赵恒�
曹凯
刘而云
陈宏涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN 201010528004 priority Critical patent/CN101977197B/en
Publication of CN101977197A publication Critical patent/CN101977197A/en
Application granted granted Critical
Publication of CN101977197B publication Critical patent/CN101977197B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a multi-receiver encryption method based on biological characteristics, overcoming various safety problems in secret key saving in the prior art by using the biological characteristics for replaying a secret key. When encrypting, encipherers only need to provide own biological characteristics, each authorized encipherer can use own biological characteristics as the secret key for deciphering without needing to save any secret key information, and meanwhile the identities of users are directly authenticated by using the information of the biological characteristics, thereby the avoidless problem of secret key abuse in cryptology is avoided, and the integral safety and reliability of the system are improved. The method comprises a registering process, an encrypting process and a deciphering process; and in the registering process, all users in the system register in a credible third party to obtain an intelligent card issued by the credible third party; in the encrypting process, the encipherers encrypt the information m through the own biological characteristics so that only authorized decipherers can decipher through the own biological characteristics; and in the deciphering process, each authorized decipherer deciphers the encrypted information through the own biological characteristics to obtain the information m.

Description

Many recipients encryption method based on biological characteristic
Technical field
The invention belongs to the network security technology field, relate to the safe practice that the Internet Service Provider broadcasts all authorized users in the network in the network application, it specifically is a kind of many recipients encryption method based on biological characteristic (as fingerprint, iris, people's face etc.), be that the sender of the message uses the biological characteristic of oneself to encrypt resulting ciphertext as key, each message recipient of mandate can use its biological characteristic that this ciphertext is decrypted.
Background technology
In distributed network is used (for example Web conference, roundtable conference, pay TV etc.), in the assurance system only authorized users can correctly receive information, and unauthorized user can't correctly receive information, needs the secure broadcast technology as support.Secure broadcast is to realize that a sender to the safe practice that a plurality of authorized receivers send identical information, can realize the demand for security of above-mentioned network application.
Document " the wireless sensor network broadcast key distribution protocol of sharing based on secret. sensing technology journal, 2008,21 (10): 1775-1779 " a kind of broadcast key distribution method of sharing based on secret disclosed.The main thought of this method is: at first, and multinomial of key distribution person's random configuration, and use this polynomial computation and system parameters is set; Then, utilize this multinomial to calculate a unique decrypted private key and it is sent to corresponding user by safe lane again for each recipient; In the key distribution process, key distribution person utilizes set system parameters that key is calculated, obtain a public information and with it to all users broadcastings; In the secret key decryption process, each user can calculate the broadcast key of being distributed to obtain according to the decrypted private key of oneself to received broadcast message.But there are some defectives in this method, i.e. the fail safe of system depends on each user the safety of own private key is preserved.Traditional key preserving type comprises two kinds: mnemonics and storage method.When key more in short-term, the user can preserve key by the mode of memory key, but the too short meeting of key causes key safety inadequately, victim is guessed out easily.When key is longer, although the fail safe of key has improved, but be unfavorable for that the user remembers, therefore, need preserve key by other carrier usually, for example: use the smart cards for storage key.But also there is easily the possibility of losing, easily being stolen in smart card, thereby makes any user who obtains this smart card can pretend to be the owner of this smart card to exercise various power, and the harm that causes can not estimate that this belongs to key abuse problem.Human biological characteristic (as fingerprint, iris, people's face etc.) is as everyone born intrinsic particular feature, can be used for replacing the key in the cryptography, do not have memory, loses, problem such as abuse.At present, generally all be to use which user's biological characteristic to encrypt based on the encryption technology of biological characteristic, the biological characteristic that just need re-use this user is decrypted.The present invention proposes a kind of many recipients encipherment scheme based on biological characteristic, and sender and each recipient are key with the biological characteristic of oneself, and sender's information encrypted can correctly be deciphered by the recipient of each mandate.
Summary of the invention
Purpose of the present invention: when carrying out secure broadcast, need each user security to preserve the problem of key in order to overcome prior art, the invention provides many recipients encryption method based on biological characteristic (as fingerprint, iris, people's face etc.), use the key in the biological characteristic replacement cryptography, the biological characteristic of oneself only need be provided during encipherer's encrypting messages, and the deciphering person of each mandate all can use the biological characteristic of oneself to be decrypted as key, no longer needs each user to preserve any key information.Even the user has lost smart card or the smart card victim is stolen, can not cause safety problem to take place yet, because encrypt or biological characteristic that must the collection in worksite user during deciphering, and only obtain smart card without any being worth.Like this, as key, no longer need each user security to preserve key in cryptography with user's biological characteristic, therefore, with regard to can not forget key, key is stolen, key is lost and problem such as key abuse, thereby can improve the entire system fail safe.
The present invention adopts the public key cryptography mechanism based on identity that a many recipients encryption method based on biological characteristic (as fingerprint, iris, people's face etc.) is provided.This method comprises following three processes:
1) all users in the registration process system comprise: encipherer R 0With n deciphering person R 1, R 2..., R n, TTP registers to trusted third party.Each user R i(i=0,1,2 ..., registration process n) is as follows:
1.1) user R iWith the identity information ID of oneself iSend to TTP;
1.2) TTP receiving user R iIdentity information ID iAfter, gather user R iBiological characteristic W i
1.3) TTP utilizes the private key S of oneself TTPBe user R iCalculate private key S i=ID iS TTP, and use user R iBiological characteristic W iTo user R iPrivate key S iBind and calculate a binding data B i, with binding data B iBe stored in a smart card Card iIn, and with smart card Card iBe presented to user R i
2) ciphering process encipherer R 0Enciphered message m makes and has only user R by the following method 1, R 2..., R nCan be decrypted:
2.1) random number T of selection;
2.2) for each deciphering person R i(i=1,2 ..., n), encipherer R 0Biological characteristic W with own collection in worksite 0', deciphering person R iIdentity information ID iAnd random number T input encipherer R 0Smart card Card 0In calculate, obtain an integer D i, integer D iComputational process be: at first utilize encipherer R 0The biological characteristic W of collection in worksite 0' to encipherer R 0Smart card Card 0The binding data B of middle storage 0Separate binding and calculate encipherer R 0Private key S 0Then, computes integer D i=H (e (S 0, ID i) ‖ T);
2.3) utilize step 2.2) n integer D being calculated i(i=1,2 ..., n), derive n numerical value to (x i, y i), (i=1,2 ..., n);
2.4) utilize (n+1) individual numerical value right: (x i, y i) (i=1,2 ..., n) and (0, m), carry out Lagrange (Lagrange) interpolation operation, obtain a polynomial of degree n f (x);
2.5) calculate n functional value f (1), f (2) ..., f (n) and message integrity check sign indicating number MIC=H (m);
2.6) encipherer R 0Ciphertext after information m encrypted is c=T ‖ ID 0‖ f (1) ‖ f (2) ‖ ... ‖ f (n) ‖ MIC;
3) each deciphering person R of decrypting process i(i=1,2 ..., n) as follows to the decrypting process of ciphertext c:
3.1) deciphering person R iBiological characteristic W with own collection in worksite i', encipherer R 0Identity information ID 0And random number T input deciphering person R iSmart card Card iIn calculate, obtain integer D iInteger D iComputational process be: at first utilize deciphering person R iThe biological characteristic W of collection in worksite i' to deciphering person R iSmart card Card iThe binding data B of middle storage iSeparate binding and calculate deciphering person R iPrivate key S iThen, computes integer D i=H (e (S i, ID 0) ‖ T);
3.2) utilize step 3.1) the integer D that calculated iDerive a numerical value to (x i, y i), simultaneously, utilize the functional value f (1) among the ciphertext c, f (2) ..., f (n) constructs n numerical value to (1, f (1)), and (2, f (2)) ..., (n, f (n));
3.3) utilize (n+1) individual numerical value right: (x i, y i), (1, f (1)), (2, f (2)) ..., (n, f (n)) carries out Lagrange (Lagrange) interpolation operation, reconstruct polynomial of degree n f (x);
3.4) computing information m '=f (0) and completeness check code MIC '=H (m ');
3.5) determining step 3.4) whether the completeness check code MIC ' that calculates equal the completeness check code MIC among the ciphertext c, if equate, then m ' be correct plaintext, successful decryption; Otherwise m ' is not correct plaintext, the deciphering failure.
The invention has the beneficial effects as follows:, can avoid the various safety problems in the key preservation by using the key in biological characteristic (as fingerprint, iris, people's face etc.) the replacement cryptography.The encipherer only need provide the biological characteristic of oneself that the information that will send is encrypted, and each deciphering person of mandate can be decrypted enciphered message by the biological characteristic of oneself and obtain cleartext information.Many recipients encryption method based on biological characteristic does not need each user to preserve any secret information, simultaneously, by the direct authenticated user identity of biological information, and not losing of smart card can influence security of system, avoid unavoidable key abuse problem in the cryptography, thereby improved the fail safe and the reliability of entire system.
Description of drawings
Fig. 1: the many recipients encryption method schematic flow sheet that the present invention is based on biological characteristic
Explanation of nouns:
TTP: trusted third party
The prime number that p:TTP chooses
G 1: the p rank module that TTP chooses
G 2: the p rank multiplicative group that TTP chooses
The G that P:TTP chooses 1Generator
E:TTP chooses G 1And G 2On bilinear transformation, i.e. e:G 1* G 1→ G 2
S TTP: the private key of TTP
N: deciphering person's number, its value are the natural number greater than 0
R i: deciphering person (i=1,2 ..., n)
R 0: the encipherer
ID i: deciphering person R iIdentity (i=1,2 ..., n)
ID 0: encipherer's identity
S i: R iPrivate key, satisfy S i=S TTPID i(i=0,1,2 ..., n)
T: random number
H (): cryptographic Hash function
F (): Lagrange (Lagrange) interpolation polynomial
MIC: message integrity check sign indicating number
W i: R iThe biological characteristic of when TTP registers, being gathered (i=0,1,2 ..., n)
W i': R iThe biological characteristic of collection in worksite when encrypting or decipher (i=0,1,2 ..., n)
Card i: TTP is presented to R in the registration process iSmart card (i=0,1,2 ..., n)
B i: R iSmart card in the binding of storing R iThe binding data of private key (i=0,1,2 ..., n)
M: information expressly
C: information ciphertext
‖: linked operation
(x i, y i): numerical value is right, x iBe abscissa, y iFor ordinate (i=1,2 ..., n)
F (i): the functional value of Lagrange (Lagrange) interpolation polynomial f (x) when x=i (i=1,2 ..., n)
Embodiment
Accompanying drawing 1 has provided the idiographic flow of the many recipients encryption method based on biological characteristic (as fingerprint, iris, people's face etc.) of the present invention.Below in conjunction with Fig. 1 will describe one complete based on biological characteristic add, decrypting process.
The 1st step: TTP sets up system parameters.System parameters is chosen by the TTP of trusted third party, comprising: the cyclic group (G on two p rank 1,+) and (G 2), wherein p is a prime number; P is G 1Generator; Make that e is G 1And G 2On bilinear transformation, i.e. e:G 1* G 1→ G 2The private key of TTP picked at random oneself
Figure BSA00000327753800051
Its corresponding PKI is Q TTP=S TTPP ∈ G 1Make that H () is an one-way cipher hash function;
The 2nd step: registration process.All users in the system comprise: encipherer R 0With n deciphering person R 1, R 2..., R n, TTP registers to trusted third party, applies for the smart card of oneself.The encipherer need register before encryption, and deciphering person only need register before deciphering.User R i(i=0,1,2 ..., registration process n) is as follows:
2.1) user R iWith the identity information ID of oneself iAnd relevant proof of identification information sends to the TTP of trusted third party together;
2.2) TTP of trusted third party receiving user R iIdentity information ID iAnd after the relevant proof of identification information, examine the validity of this user identity.If invalid, then notify user identity invalid, otherwise, require user R iThe biological characteristic W of Cai Jiing then and there i
2.3) TTP of trusted third party utilizes the private key S of oneself TTPBe user R iCalculate private key S i=ID iS TTP, and use user R iBiological characteristic W iTo user R iPrivate key S iBind and calculate a binding data B i, with binding data B iBe stored in an only smart card Card of the property write iIn (this smart card can only write data, and can not sense data, purpose be for protect in the smart card information not by malice read, leak data information not), and with this smart card Card iBe presented to user R i
The 3rd step: encipherer R 0Apply for information to system broadcasts, all authorize deciphering person's identity information in the gathering system.Suppose encipherer R 0Collecting has n to authorize deciphering person R in the system 1, R 2..., R n
The 4th step: ciphering process.Encipherer R 0Enciphered message m makes and has only the deciphering person of mandate R by the following method 1, R 2..., R n, just can be decrypted:
4.1) random number T of selection;
4.2) for each deciphering person R i(i=1,2 ..., n), encipherer R 0The biological characteristic W of collection in worksite oneself 0', and with the biological characteristic W of own collection in worksite 0', deciphering person R iIdentity information ID iAnd random number T input encipherer R 0Smart card Card 0In calculate, obtain the integer D of a secret iThe smart card computing can be regarded as a function, comprises three input parameters and an output result.Three inputs are respectively: biological characteristic W 0', identity information ID iAnd random number T; An output result is integer D iInteger D iComputational methods be: at first utilize encipherer R 0The biological characteristic W of collection in worksite 0' to encipherer R 0Smart card Card 0The binding data B of middle storage 0Separate binding and calculate encipherer R 0Private key S 0Then, computes integer D i=H (e (S 0, ID i) ‖ T) (for fear of to computing, improve system's operational performance, can use D i=H (S 0ID i‖ T) replaces D i=H (e (S 0, ID i) ‖ T));
4.3) utilize step 4.2) n integer D being calculated i(i=1,2 ..., n), derive n numerical value to (x i, y i), satisfy x i>n (i=1,2 ..., n);
4.4) utilize (n+1) individual numerical value right: (x i, y i) (i=1,2 ..., n) and (0, m), carry out Lagrange (Lagrange) interpolation operation, obtain a polynomial of degree n f (x);
4.5) calculate n functional value f (1), f (3) ..., f (n) and message integrity check sign indicating number MIC=H (m);
4.6) encipherer R 0Ciphertext after information m encrypted is c=T ‖ ID 0‖ f (1) ‖ f (2) ‖ ... ‖ f (n) ‖ MIC;
The 5th step, decrypting process.Each deciphering person R i(i=1,2 ..., n) as follows to the decrypting process of ciphertext c:
5.1) deciphering person R iBiological characteristic W with own collection in worksite i', encipherer R 0Identity information ID 0And random number T input deciphering person R iSmart card Card iIn calculate, obtain secret integer D iWith 4.2) described in the smart card account form identical, integer D iComputational process be: at first utilize deciphering person R iThe biological characteristic W of collection in worksite i' to deciphering person R iSmart card Card iThe binding data B of middle storage iSeparate binding and calculate deciphering person R iPrivate key S iThen, computes integer D i=H (e (S i, ID 0) ‖ T) (for fear of to computing, improve system's operational performance, can use D i=H (S iID 0‖ T) replaces D i=H (e (S i, ID 0) ‖ T));
5.2) utilize step 5.1) the integer D that calculated iDerive a numerical value to (x i, y i), satisfy x i>n simultaneously, utilizes the functional value f (1) among the ciphertext c, f (2) ..., f (n) constructs n numerical value to (1, f (1)), and (2, f (2)) ..., (n, f (n));
5.3) utilize (n+1) individual numerical value right: (x i, y i), (1, f (1)), (2, f (2)) ..., (n, f (n)) carries out Lagrange (Lagrange) interpolation operation, reconstruct polynomial of degree n f (x);
5.4) computing information m '=f (0) and completeness check code MIC '=H (m ');
5.5) determining step 5.4) whether the completeness check code MIC ' that calculates equal the completeness check code MIC among the ciphertext c, if equate, then m ' be correct plaintext, successful decryption; Otherwise m ' is not correct plaintext, the deciphering failure.

Claims (4)

1. based on many recipients encryption method of biological characteristic, it is characterized in that: use the key in the biological characteristic replacement cryptography, the biological characteristic of oneself only need be provided during encipherer's encrypting messages, and the deciphering person of each mandate all can use the biological characteristic of oneself to be decrypted as key, no longer need each user to preserve any key information, this method comprises three processes:
1.1) registration process: all users in the system register to trusted third party, obtain the smart card that trusted third party issues;
1.2) ciphering process: the encipherer encrypts information m by the biological characteristic of oneself, makes to have only the deciphering person of mandate to be decrypted by the biological characteristic of oneself;
1.3) decrypting process: the deciphering person of each mandate is decrypted enciphered message by the biological characteristic of oneself, obtains information m.
2. the many recipients encryption method based on biological characteristic according to claim 1 is characterized in that: all users in the system comprise: encipherer R 0With n deciphering person R 1, R 2..., R n, TTP registers to trusted third party, each user R i(i=0,1,2 ..., registration step n) is as follows:
2.1) user R iWith the identity information ID of oneself iSend to the TTP of trusted third party;
2.2) TTP of trusted third party receiving user R iIdentity information ID iAfter, gather user R iBiological characteristic W i
2.3) TTP of trusted third party utilizes the private key S of oneself TTPBe user R iCalculate private key S i=ID iS TTP, and use user R iBiological characteristic W iTo user R iPrivate key S iBind and calculate a binding data B i, with binding data B iBe stored in a smart card Card iIn, and with smart card Card iBe presented to user R i
3. the many recipients encryption method based on biological characteristic according to claim 1 is characterized in that: encipherer R 0Enciphered message m makes and has only deciphering person R by the following method 1, R 2..., R nCan be decrypted:
3.1) random number T of selection;
3.2) for each deciphering person R i, i=1,2 ..., n, encipherer R 0Biological characteristic W with own collection in worksite 0', deciphering person R iIdentity information ID iAnd random number T input encipherer R 0Smart card Card 0In calculate, obtain an integer D i, integer D iComputational process be: at first utilize encipherer R 0The biological characteristic W of collection in worksite 0' to encipherer R 0Smart card Card 0The binding data B of middle storage 0Separate binding and calculate encipherer R 0Private key S 0Then, computes integer D i=H (e (S 0, ID i) ‖ T);
3.3) utilize step 3.2) n integer D being calculated i, i=1,2 ..., n derives n numerical value to (x i, y i), i=1,2 ..., n;
3.4) utilize n+1 numerical value right: (x i, y i), i=1,2 ..., n and (0, m), carry out Lagrangian Lagrange interpolation operation, obtain a polynomial of degree n f (x);
3.5) calculate n functional value f (1), f (2) ..., f (n) and message integrity check sign indicating number MIC=H (m);
3.6) encipherer R 0Ciphertext after information m encrypted is c=T ‖ ID 0‖ f (1) ‖ f (2) ‖ ... ‖ f (n) ‖ MIC.
4. the many recipients encryption method based on biological characteristic according to claim 1 is characterized in that: the deciphering person R of each mandate i, i=1,2 ..., n, as follows to the decryption step of ciphertext c:
4.1) deciphering person R iBiological characteristic W with own collection in worksite i', encipherer R 0Identity information ID 0And random number T input deciphering person R iSmart card Card iIn calculate, obtain integer D i, integer D iComputational process be: at first utilize deciphering person R iThe biological characteristic W of collection in worksite i' to deciphering person R iSmart card Card iThe binding data B of middle storage iSeparate binding and calculate deciphering person R iPrivate key S iThen, computes integer D i=H (e (S i, ID 0) ‖ T);
4.2) utilize step 4.1) the integer D that calculated iDerive a numerical value to (x i, y i), simultaneously, utilize the functional value f (1) among the ciphertext c, f (2) ..., f (n) constructs n numerical value to (1, f (1)), and (2, f (2)) ..., (n, f (n));
4.3) utilize n+1 numerical value right: (x i, y i), (1, f (1)), (2, f (2)) ..., (n, f (n)) carries out Lagrangian Lagrange interpolation operation, reconstruct polynomial of degree n f (x);
4.4) computing information m '=f (0) and completeness check code MIC '=H (m ');
4.5) determining step 4.4) whether the completeness check code MIC ' that calculates equal the completeness check code MIC among the ciphertext c, if equate, then m ' be correct plaintext, successful decryption; Otherwise m ' is not correct plaintext, the deciphering failure.
CN 201010528004 2010-10-29 2010-10-29 Multi-receiver encryption method based on biological characteristics Expired - Fee Related CN101977197B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010528004 CN101977197B (en) 2010-10-29 2010-10-29 Multi-receiver encryption method based on biological characteristics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010528004 CN101977197B (en) 2010-10-29 2010-10-29 Multi-receiver encryption method based on biological characteristics

Publications (2)

Publication Number Publication Date
CN101977197A true CN101977197A (en) 2011-02-16
CN101977197B CN101977197B (en) 2013-09-25

Family

ID=43577042

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010528004 Expired - Fee Related CN101977197B (en) 2010-10-29 2010-10-29 Multi-receiver encryption method based on biological characteristics

Country Status (1)

Country Link
CN (1) CN101977197B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819760A (en) * 2012-07-20 2012-12-12 陈平 Data storage device, medical information card, and information safety processing method of medical information card
CN103368741A (en) * 2013-05-06 2013-10-23 西安电子科技大学 Anonymous participant identity-based signcryption method for multiple receivers
CN105046127A (en) * 2015-05-26 2015-11-11 小米科技有限责任公司 Encryption and decryption method and apparatus
CN105574387A (en) * 2015-06-16 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Information security processing method and user terminal
CN105656870A (en) * 2015-06-29 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Data transmission method, device and system
CN106034107A (en) * 2015-03-11 2016-10-19 西安酷派软件科技有限公司 Data processing method and device and intelligent electronic equipment
CN103368741B (en) * 2013-05-06 2016-11-30 西安电子科技大学 The multi-receiver label decryption method of participant's identity anonymous
CN108292334A (en) * 2015-10-26 2018-07-17 维萨国际服务协会 Wireless living things feature recognition Verification System and method
CN111201767A (en) * 2017-10-11 2020-05-26 高通股份有限公司 System and method for context-based device address generation
CN111787400A (en) * 2020-07-24 2020-10-16 苏州浪潮智能科技有限公司 Video communication identity authentication method, device, equipment and readable medium
CN112580010A (en) * 2020-12-23 2021-03-30 四川虹微技术有限公司 Biological feature sharing method and device, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050160269A1 (en) * 2004-01-20 2005-07-21 Matsushita Electric Works, Ltd. Common security key generation apparatus
CN101350724A (en) * 2008-08-15 2009-01-21 西安电子科技大学 Encrypting method base on biology characteristic information

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050160269A1 (en) * 2004-01-20 2005-07-21 Matsushita Electric Works, Ltd. Common security key generation apparatus
CN101350724A (en) * 2008-08-15 2009-01-21 西安电子科技大学 Encrypting method base on biology characteristic information

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李鹏等: "生物特征模板保护", 《软件学报》 *

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819760B (en) * 2012-07-20 2015-12-16 陈平 Data storage device, China doctor card and information security processing method thereof
CN102819760A (en) * 2012-07-20 2012-12-12 陈平 Data storage device, medical information card, and information safety processing method of medical information card
CN103368741A (en) * 2013-05-06 2013-10-23 西安电子科技大学 Anonymous participant identity-based signcryption method for multiple receivers
CN103368741B (en) * 2013-05-06 2016-11-30 西安电子科技大学 The multi-receiver label decryption method of participant's identity anonymous
CN106034107B (en) * 2015-03-11 2019-12-10 西安酷派软件科技有限公司 Data processing method and device and intelligent electronic equipment
CN106034107A (en) * 2015-03-11 2016-10-19 西安酷派软件科技有限公司 Data processing method and device and intelligent electronic equipment
CN105046127A (en) * 2015-05-26 2015-11-11 小米科技有限责任公司 Encryption and decryption method and apparatus
CN105574387A (en) * 2015-06-16 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Information security processing method and user terminal
CN105656870A (en) * 2015-06-29 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Data transmission method, device and system
CN105656870B (en) * 2015-06-29 2019-03-08 宇龙计算机通信科技(深圳)有限公司 A kind of data transmission method, apparatus and system
CN108292334A (en) * 2015-10-26 2018-07-17 维萨国际服务协会 Wireless living things feature recognition Verification System and method
CN108292334B (en) * 2015-10-26 2022-04-12 维萨国际服务协会 Wireless biometric authentication system and method
US11847652B2 (en) 2015-10-26 2023-12-19 Visa International Service Association Wireless biometric authentication system and method
CN111201767A (en) * 2017-10-11 2020-05-26 高通股份有限公司 System and method for context-based device address generation
CN111201767B (en) * 2017-10-11 2021-05-07 高通股份有限公司 System and method for context-based device address generation
CN111787400A (en) * 2020-07-24 2020-10-16 苏州浪潮智能科技有限公司 Video communication identity authentication method, device, equipment and readable medium
CN112580010A (en) * 2020-12-23 2021-03-30 四川虹微技术有限公司 Biological feature sharing method and device, electronic equipment and storage medium
CN112580010B (en) * 2020-12-23 2024-01-30 四川虹微技术有限公司 Biological feature sharing method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN101977197B (en) 2013-09-25

Similar Documents

Publication Publication Date Title
CN101977197B (en) Multi-receiver encryption method based on biological characteristics
CN107070652B (en) A kind of car networking method for secret protection that the ciphertext based on CP-ABE is anti-tamper and system
CN104796265B (en) A kind of Internet of Things identity identifying method based on Bluetooth communication access
CN101789865B (en) Dedicated server used for encryption and encryption method
CN101075874B (en) Certifying method and system
CN106973056B (en) Object-oriented security chip and encryption method thereof
CN102394749B (en) Line protection method, system, information safety equipment and application equipment for data transmission
CN102118710A (en) System and method for transmitting data between mobile terminals
CN105163309B (en) A method of the wireless sensor network security communication based on combination pin
CN101359991A (en) Public key cipher system private key escrowing system based on identification
CN104836657B (en) A kind of identity-based anonymity broadcast encryption method with efficient decryption features
CN105429941A (en) Multi-receiver identity anonymity signcryption method
CN103401839A (en) Attribute protection based multiple authorization center encryption method
US6640303B1 (en) System and method for encryption using transparent keys
CN103179514B (en) A kind of mobile phone safety group's distribution method and device of sensitive information
CN103312506A (en) Multi-receiver sign-cryption method for receivers with anonymous identities
CN102594551B (en) Method for reliable statistics of privacy data on radio frequency identification (RFID) tag
CN109543434A (en) Block chain information encryption method, decryption method, storage method and device
CN114095276B (en) Intelligent home security authentication method based on Internet of things
CN106878322B (en) A kind of encryption and decryption method of fixed length ciphertext and key based on attribute
CN105391554A (en) Method and system for realizing fingerprint matching by using ciphertext
CN108880995A (en) Strange social network user information and message based on block chain push encryption method
CN105577386A (en) Data encryption method of bilateral interaction intelligent electric energy meter
Kaya et al. Public key cryptography based privacy preserving multi-context RFID infrastructure
CN106533656A (en) Key multilayer mixed encryption/decryption method based on WSN

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130925

Termination date: 20181029