CN101977197A - Multi-receiver encryption method based on biological characteristics - Google Patents
Multi-receiver encryption method based on biological characteristics Download PDFInfo
- Publication number
- CN101977197A CN101977197A CN2010105280049A CN201010528004A CN101977197A CN 101977197 A CN101977197 A CN 101977197A CN 2010105280049 A CN2010105280049 A CN 2010105280049A CN 201010528004 A CN201010528004 A CN 201010528004A CN 101977197 A CN101977197 A CN 101977197A
- Authority
- CN
- China
- Prior art keywords
- biological characteristic
- encipherer
- user
- information
- deciphering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a multi-receiver encryption method based on biological characteristics, overcoming various safety problems in secret key saving in the prior art by using the biological characteristics for replaying a secret key. When encrypting, encipherers only need to provide own biological characteristics, each authorized encipherer can use own biological characteristics as the secret key for deciphering without needing to save any secret key information, and meanwhile the identities of users are directly authenticated by using the information of the biological characteristics, thereby the avoidless problem of secret key abuse in cryptology is avoided, and the integral safety and reliability of the system are improved. The method comprises a registering process, an encrypting process and a deciphering process; and in the registering process, all users in the system register in a credible third party to obtain an intelligent card issued by the credible third party; in the encrypting process, the encipherers encrypt the information m through the own biological characteristics so that only authorized decipherers can decipher through the own biological characteristics; and in the deciphering process, each authorized decipherer deciphers the encrypted information through the own biological characteristics to obtain the information m.
Description
Technical field
The invention belongs to the network security technology field, relate to the safe practice that the Internet Service Provider broadcasts all authorized users in the network in the network application, it specifically is a kind of many recipients encryption method based on biological characteristic (as fingerprint, iris, people's face etc.), be that the sender of the message uses the biological characteristic of oneself to encrypt resulting ciphertext as key, each message recipient of mandate can use its biological characteristic that this ciphertext is decrypted.
Background technology
In distributed network is used (for example Web conference, roundtable conference, pay TV etc.), in the assurance system only authorized users can correctly receive information, and unauthorized user can't correctly receive information, needs the secure broadcast technology as support.Secure broadcast is to realize that a sender to the safe practice that a plurality of authorized receivers send identical information, can realize the demand for security of above-mentioned network application.
Document " the wireless sensor network broadcast key distribution protocol of sharing based on secret. sensing technology journal, 2008,21 (10): 1775-1779 " a kind of broadcast key distribution method of sharing based on secret disclosed.The main thought of this method is: at first, and multinomial of key distribution person's random configuration, and use this polynomial computation and system parameters is set; Then, utilize this multinomial to calculate a unique decrypted private key and it is sent to corresponding user by safe lane again for each recipient; In the key distribution process, key distribution person utilizes set system parameters that key is calculated, obtain a public information and with it to all users broadcastings; In the secret key decryption process, each user can calculate the broadcast key of being distributed to obtain according to the decrypted private key of oneself to received broadcast message.But there are some defectives in this method, i.e. the fail safe of system depends on each user the safety of own private key is preserved.Traditional key preserving type comprises two kinds: mnemonics and storage method.When key more in short-term, the user can preserve key by the mode of memory key, but the too short meeting of key causes key safety inadequately, victim is guessed out easily.When key is longer, although the fail safe of key has improved, but be unfavorable for that the user remembers, therefore, need preserve key by other carrier usually, for example: use the smart cards for storage key.But also there is easily the possibility of losing, easily being stolen in smart card, thereby makes any user who obtains this smart card can pretend to be the owner of this smart card to exercise various power, and the harm that causes can not estimate that this belongs to key abuse problem.Human biological characteristic (as fingerprint, iris, people's face etc.) is as everyone born intrinsic particular feature, can be used for replacing the key in the cryptography, do not have memory, loses, problem such as abuse.At present, generally all be to use which user's biological characteristic to encrypt based on the encryption technology of biological characteristic, the biological characteristic that just need re-use this user is decrypted.The present invention proposes a kind of many recipients encipherment scheme based on biological characteristic, and sender and each recipient are key with the biological characteristic of oneself, and sender's information encrypted can correctly be deciphered by the recipient of each mandate.
Summary of the invention
Purpose of the present invention: when carrying out secure broadcast, need each user security to preserve the problem of key in order to overcome prior art, the invention provides many recipients encryption method based on biological characteristic (as fingerprint, iris, people's face etc.), use the key in the biological characteristic replacement cryptography, the biological characteristic of oneself only need be provided during encipherer's encrypting messages, and the deciphering person of each mandate all can use the biological characteristic of oneself to be decrypted as key, no longer needs each user to preserve any key information.Even the user has lost smart card or the smart card victim is stolen, can not cause safety problem to take place yet, because encrypt or biological characteristic that must the collection in worksite user during deciphering, and only obtain smart card without any being worth.Like this, as key, no longer need each user security to preserve key in cryptography with user's biological characteristic, therefore, with regard to can not forget key, key is stolen, key is lost and problem such as key abuse, thereby can improve the entire system fail safe.
The present invention adopts the public key cryptography mechanism based on identity that a many recipients encryption method based on biological characteristic (as fingerprint, iris, people's face etc.) is provided.This method comprises following three processes:
1) all users in the registration process system comprise: encipherer R
0With n deciphering person R
1, R
2..., R
n, TTP registers to trusted third party.Each user R
i(i=0,1,2 ..., registration process n) is as follows:
1.1) user R
iWith the identity information ID of oneself
iSend to TTP;
1.2) TTP receiving user R
iIdentity information ID
iAfter, gather user R
iBiological characteristic W
i
1.3) TTP utilizes the private key S of oneself
TTPBe user R
iCalculate private key S
i=ID
iS
TTP, and use user R
iBiological characteristic W
iTo user R
iPrivate key S
iBind and calculate a binding data B
i, with binding data B
iBe stored in a smart card Card
iIn, and with smart card Card
iBe presented to user R
i
2) ciphering process encipherer R
0Enciphered message m makes and has only user R by the following method
1, R
2..., R
nCan be decrypted:
2.1) random number T of selection;
2.2) for each deciphering person R
i(i=1,2 ..., n), encipherer R
0Biological characteristic W with own collection in worksite
0', deciphering person R
iIdentity information ID
iAnd random number T input encipherer R
0Smart card Card
0In calculate, obtain an integer D
i, integer D
iComputational process be: at first utilize encipherer R
0The biological characteristic W of collection in worksite
0' to encipherer R
0Smart card Card
0The binding data B of middle storage
0Separate binding and calculate encipherer R
0Private key S
0Then, computes integer D
i=H (e (S
0, ID
i) ‖ T);
2.3) utilize step 2.2) n integer D being calculated
i(i=1,2 ..., n), derive n numerical value to (x
i, y
i), (i=1,2 ..., n);
2.4) utilize (n+1) individual numerical value right: (x
i, y
i) (i=1,2 ..., n) and (0, m), carry out Lagrange (Lagrange) interpolation operation, obtain a polynomial of degree n f (x);
2.5) calculate n functional value f (1), f (2) ..., f (n) and message integrity check sign indicating number MIC=H (m);
2.6) encipherer R
0Ciphertext after information m encrypted is c=T ‖ ID
0‖ f (1) ‖ f (2) ‖ ... ‖ f (n) ‖ MIC;
3) each deciphering person R of decrypting process
i(i=1,2 ..., n) as follows to the decrypting process of ciphertext c:
3.1) deciphering person R
iBiological characteristic W with own collection in worksite
i', encipherer R
0Identity information ID
0And random number T input deciphering person R
iSmart card Card
iIn calculate, obtain integer D
iInteger D
iComputational process be: at first utilize deciphering person R
iThe biological characteristic W of collection in worksite
i' to deciphering person R
iSmart card Card
iThe binding data B of middle storage
iSeparate binding and calculate deciphering person R
iPrivate key S
iThen, computes integer D
i=H (e (S
i, ID
0) ‖ T);
3.2) utilize step 3.1) the integer D that calculated
iDerive a numerical value to (x
i, y
i), simultaneously, utilize the functional value f (1) among the ciphertext c, f (2) ..., f (n) constructs n numerical value to (1, f (1)), and (2, f (2)) ..., (n, f (n));
3.3) utilize (n+1) individual numerical value right: (x
i, y
i), (1, f (1)), (2, f (2)) ..., (n, f (n)) carries out Lagrange (Lagrange) interpolation operation, reconstruct polynomial of degree n f (x);
3.4) computing information m '=f (0) and completeness check code MIC '=H (m ');
3.5) determining step 3.4) whether the completeness check code MIC ' that calculates equal the completeness check code MIC among the ciphertext c, if equate, then m ' be correct plaintext, successful decryption; Otherwise m ' is not correct plaintext, the deciphering failure.
The invention has the beneficial effects as follows:, can avoid the various safety problems in the key preservation by using the key in biological characteristic (as fingerprint, iris, people's face etc.) the replacement cryptography.The encipherer only need provide the biological characteristic of oneself that the information that will send is encrypted, and each deciphering person of mandate can be decrypted enciphered message by the biological characteristic of oneself and obtain cleartext information.Many recipients encryption method based on biological characteristic does not need each user to preserve any secret information, simultaneously, by the direct authenticated user identity of biological information, and not losing of smart card can influence security of system, avoid unavoidable key abuse problem in the cryptography, thereby improved the fail safe and the reliability of entire system.
Description of drawings
Fig. 1: the many recipients encryption method schematic flow sheet that the present invention is based on biological characteristic
Explanation of nouns:
TTP: trusted third party
The prime number that p:TTP chooses
G
1: the p rank module that TTP chooses
G
2: the p rank multiplicative group that TTP chooses
The G that P:TTP chooses
1Generator
E:TTP chooses G
1And G
2On bilinear transformation, i.e. e:G
1* G
1→ G
2
S
TTP: the private key of TTP
N: deciphering person's number, its value are the natural number greater than 0
R
i: deciphering person (i=1,2 ..., n)
R
0: the encipherer
ID
i: deciphering person R
iIdentity (i=1,2 ..., n)
ID
0: encipherer's identity
S
i: R
iPrivate key, satisfy S
i=S
TTPID
i(i=0,1,2 ..., n)
T: random number
H (): cryptographic Hash function
F (): Lagrange (Lagrange) interpolation polynomial
MIC: message integrity check sign indicating number
W
i: R
iThe biological characteristic of when TTP registers, being gathered (i=0,1,2 ..., n)
W
i': R
iThe biological characteristic of collection in worksite when encrypting or decipher (i=0,1,2 ..., n)
Card
i: TTP is presented to R in the registration process
iSmart card (i=0,1,2 ..., n)
B
i: R
iSmart card in the binding of storing R
iThe binding data of private key (i=0,1,2 ..., n)
M: information expressly
C: information ciphertext
‖: linked operation
(x
i, y
i): numerical value is right, x
iBe abscissa, y
iFor ordinate (i=1,2 ..., n)
F (i): the functional value of Lagrange (Lagrange) interpolation polynomial f (x) when x=i (i=1,2 ..., n)
Embodiment
Accompanying drawing 1 has provided the idiographic flow of the many recipients encryption method based on biological characteristic (as fingerprint, iris, people's face etc.) of the present invention.Below in conjunction with Fig. 1 will describe one complete based on biological characteristic add, decrypting process.
The 1st step: TTP sets up system parameters.System parameters is chosen by the TTP of trusted third party, comprising: the cyclic group (G on two p rank
1,+) and (G
2), wherein p is a prime number; P is G
1Generator; Make that e is G
1And G
2On bilinear transformation, i.e. e:G
1* G
1→ G
2The private key of TTP picked at random oneself
Its corresponding PKI is Q
TTP=S
TTPP ∈ G
1Make that H () is an one-way cipher hash function;
The 2nd step: registration process.All users in the system comprise: encipherer R
0With n deciphering person R
1, R
2..., R
n, TTP registers to trusted third party, applies for the smart card of oneself.The encipherer need register before encryption, and deciphering person only need register before deciphering.User R
i(i=0,1,2 ..., registration process n) is as follows:
2.1) user R
iWith the identity information ID of oneself
iAnd relevant proof of identification information sends to the TTP of trusted third party together;
2.2) TTP of trusted third party receiving user R
iIdentity information ID
iAnd after the relevant proof of identification information, examine the validity of this user identity.If invalid, then notify user identity invalid, otherwise, require user R
iThe biological characteristic W of Cai Jiing then and there
i
2.3) TTP of trusted third party utilizes the private key S of oneself
TTPBe user R
iCalculate private key S
i=ID
iS
TTP, and use user R
iBiological characteristic W
iTo user R
iPrivate key S
iBind and calculate a binding data B
i, with binding data B
iBe stored in an only smart card Card of the property write
iIn (this smart card can only write data, and can not sense data, purpose be for protect in the smart card information not by malice read, leak data information not), and with this smart card Card
iBe presented to user R
i
The 3rd step: encipherer R
0Apply for information to system broadcasts, all authorize deciphering person's identity information in the gathering system.Suppose encipherer R
0Collecting has n to authorize deciphering person R in the system
1, R
2..., R
n
The 4th step: ciphering process.Encipherer R
0Enciphered message m makes and has only the deciphering person of mandate R by the following method
1, R
2..., R
n, just can be decrypted:
4.1) random number T of selection;
4.2) for each deciphering person R
i(i=1,2 ..., n), encipherer R
0The biological characteristic W of collection in worksite oneself
0', and with the biological characteristic W of own collection in worksite
0', deciphering person R
iIdentity information ID
iAnd random number T input encipherer R
0Smart card Card
0In calculate, obtain the integer D of a secret
iThe smart card computing can be regarded as a function, comprises three input parameters and an output result.Three inputs are respectively: biological characteristic W
0', identity information ID
iAnd random number T; An output result is integer D
iInteger D
iComputational methods be: at first utilize encipherer R
0The biological characteristic W of collection in worksite
0' to encipherer R
0Smart card Card
0The binding data B of middle storage
0Separate binding and calculate encipherer R
0Private key S
0Then, computes integer D
i=H (e (S
0, ID
i) ‖ T) (for fear of to computing, improve system's operational performance, can use D
i=H (S
0ID
i‖ T) replaces D
i=H (e (S
0, ID
i) ‖ T));
4.3) utilize step 4.2) n integer D being calculated
i(i=1,2 ..., n), derive n numerical value to (x
i, y
i), satisfy x
i>n (i=1,2 ..., n);
4.4) utilize (n+1) individual numerical value right: (x
i, y
i) (i=1,2 ..., n) and (0, m), carry out Lagrange (Lagrange) interpolation operation, obtain a polynomial of degree n f (x);
4.5) calculate n functional value f (1), f (3) ..., f (n) and message integrity check sign indicating number MIC=H (m);
4.6) encipherer R
0Ciphertext after information m encrypted is c=T ‖ ID
0‖ f (1) ‖ f (2) ‖ ... ‖ f (n) ‖ MIC;
The 5th step, decrypting process.Each deciphering person R
i(i=1,2 ..., n) as follows to the decrypting process of ciphertext c:
5.1) deciphering person R
iBiological characteristic W with own collection in worksite
i', encipherer R
0Identity information ID
0And random number T input deciphering person R
iSmart card Card
iIn calculate, obtain secret integer D
iWith 4.2) described in the smart card account form identical, integer D
iComputational process be: at first utilize deciphering person R
iThe biological characteristic W of collection in worksite
i' to deciphering person R
iSmart card Card
iThe binding data B of middle storage
iSeparate binding and calculate deciphering person R
iPrivate key S
iThen, computes integer D
i=H (e (S
i, ID
0) ‖ T) (for fear of to computing, improve system's operational performance, can use D
i=H (S
iID
0‖ T) replaces D
i=H (e (S
i, ID
0) ‖ T));
5.2) utilize step 5.1) the integer D that calculated
iDerive a numerical value to (x
i, y
i), satisfy x
i>n simultaneously, utilizes the functional value f (1) among the ciphertext c, f (2) ..., f (n) constructs n numerical value to (1, f (1)), and (2, f (2)) ..., (n, f (n));
5.3) utilize (n+1) individual numerical value right: (x
i, y
i), (1, f (1)), (2, f (2)) ..., (n, f (n)) carries out Lagrange (Lagrange) interpolation operation, reconstruct polynomial of degree n f (x);
5.4) computing information m '=f (0) and completeness check code MIC '=H (m ');
5.5) determining step 5.4) whether the completeness check code MIC ' that calculates equal the completeness check code MIC among the ciphertext c, if equate, then m ' be correct plaintext, successful decryption; Otherwise m ' is not correct plaintext, the deciphering failure.
Claims (4)
1. based on many recipients encryption method of biological characteristic, it is characterized in that: use the key in the biological characteristic replacement cryptography, the biological characteristic of oneself only need be provided during encipherer's encrypting messages, and the deciphering person of each mandate all can use the biological characteristic of oneself to be decrypted as key, no longer need each user to preserve any key information, this method comprises three processes:
1.1) registration process: all users in the system register to trusted third party, obtain the smart card that trusted third party issues;
1.2) ciphering process: the encipherer encrypts information m by the biological characteristic of oneself, makes to have only the deciphering person of mandate to be decrypted by the biological characteristic of oneself;
1.3) decrypting process: the deciphering person of each mandate is decrypted enciphered message by the biological characteristic of oneself, obtains information m.
2. the many recipients encryption method based on biological characteristic according to claim 1 is characterized in that: all users in the system comprise: encipherer R
0With n deciphering person R
1, R
2..., R
n, TTP registers to trusted third party, each user R
i(i=0,1,2 ..., registration step n) is as follows:
2.1) user R
iWith the identity information ID of oneself
iSend to the TTP of trusted third party;
2.2) TTP of trusted third party receiving user R
iIdentity information ID
iAfter, gather user R
iBiological characteristic W
i
2.3) TTP of trusted third party utilizes the private key S of oneself
TTPBe user R
iCalculate private key S
i=ID
iS
TTP, and use user R
iBiological characteristic W
iTo user R
iPrivate key S
iBind and calculate a binding data B
i, with binding data B
iBe stored in a smart card Card
iIn, and with smart card Card
iBe presented to user R
i
3. the many recipients encryption method based on biological characteristic according to claim 1 is characterized in that: encipherer R
0Enciphered message m makes and has only deciphering person R by the following method
1, R
2..., R
nCan be decrypted:
3.1) random number T of selection;
3.2) for each deciphering person R
i, i=1,2 ..., n, encipherer R
0Biological characteristic W with own collection in worksite
0', deciphering person R
iIdentity information ID
iAnd random number T input encipherer R
0Smart card Card
0In calculate, obtain an integer D
i, integer D
iComputational process be: at first utilize encipherer R
0The biological characteristic W of collection in worksite
0' to encipherer R
0Smart card Card
0The binding data B of middle storage
0Separate binding and calculate encipherer R
0Private key S
0Then, computes integer D
i=H (e (S
0, ID
i) ‖ T);
3.3) utilize step 3.2) n integer D being calculated
i, i=1,2 ..., n derives n numerical value to (x
i, y
i), i=1,2 ..., n;
3.4) utilize n+1 numerical value right: (x
i, y
i), i=1,2 ..., n and (0, m), carry out Lagrangian Lagrange interpolation operation, obtain a polynomial of degree n f (x);
3.5) calculate n functional value f (1), f (2) ..., f (n) and message integrity check sign indicating number MIC=H (m);
3.6) encipherer R
0Ciphertext after information m encrypted is c=T ‖ ID
0‖ f (1) ‖ f (2) ‖ ... ‖ f (n) ‖ MIC.
4. the many recipients encryption method based on biological characteristic according to claim 1 is characterized in that: the deciphering person R of each mandate
i, i=1,2 ..., n, as follows to the decryption step of ciphertext c:
4.1) deciphering person R
iBiological characteristic W with own collection in worksite
i', encipherer R
0Identity information ID
0And random number T input deciphering person R
iSmart card Card
iIn calculate, obtain integer D
i, integer D
iComputational process be: at first utilize deciphering person R
iThe biological characteristic W of collection in worksite
i' to deciphering person R
iSmart card Card
iThe binding data B of middle storage
iSeparate binding and calculate deciphering person R
iPrivate key S
iThen, computes integer D
i=H (e (S
i, ID
0) ‖ T);
4.2) utilize step 4.1) the integer D that calculated
iDerive a numerical value to (x
i, y
i), simultaneously, utilize the functional value f (1) among the ciphertext c, f (2) ..., f (n) constructs n numerical value to (1, f (1)), and (2, f (2)) ..., (n, f (n));
4.3) utilize n+1 numerical value right: (x
i, y
i), (1, f (1)), (2, f (2)) ..., (n, f (n)) carries out Lagrangian Lagrange interpolation operation, reconstruct polynomial of degree n f (x);
4.4) computing information m '=f (0) and completeness check code MIC '=H (m ');
4.5) determining step 4.4) whether the completeness check code MIC ' that calculates equal the completeness check code MIC among the ciphertext c, if equate, then m ' be correct plaintext, successful decryption; Otherwise m ' is not correct plaintext, the deciphering failure.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201010528004 CN101977197B (en) | 2010-10-29 | 2010-10-29 | Multi-receiver encryption method based on biological characteristics |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201010528004 CN101977197B (en) | 2010-10-29 | 2010-10-29 | Multi-receiver encryption method based on biological characteristics |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101977197A true CN101977197A (en) | 2011-02-16 |
CN101977197B CN101977197B (en) | 2013-09-25 |
Family
ID=43577042
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 201010528004 Expired - Fee Related CN101977197B (en) | 2010-10-29 | 2010-10-29 | Multi-receiver encryption method based on biological characteristics |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101977197B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102819760A (en) * | 2012-07-20 | 2012-12-12 | 陈平 | Data storage device, medical information card, and information safety processing method of medical information card |
CN103368741A (en) * | 2013-05-06 | 2013-10-23 | 西安电子科技大学 | Anonymous participant identity-based signcryption method for multiple receivers |
CN105046127A (en) * | 2015-05-26 | 2015-11-11 | 小米科技有限责任公司 | Encryption and decryption method and apparatus |
CN105574387A (en) * | 2015-06-16 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Information security processing method and user terminal |
CN105656870A (en) * | 2015-06-29 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Data transmission method, device and system |
CN106034107A (en) * | 2015-03-11 | 2016-10-19 | 西安酷派软件科技有限公司 | Data processing method and device and intelligent electronic equipment |
CN103368741B (en) * | 2013-05-06 | 2016-11-30 | 西安电子科技大学 | The multi-receiver label decryption method of participant's identity anonymous |
CN108292334A (en) * | 2015-10-26 | 2018-07-17 | 维萨国际服务协会 | Wireless living things feature recognition Verification System and method |
CN111201767A (en) * | 2017-10-11 | 2020-05-26 | 高通股份有限公司 | System and method for context-based device address generation |
CN111787400A (en) * | 2020-07-24 | 2020-10-16 | 苏州浪潮智能科技有限公司 | Video communication identity authentication method, device, equipment and readable medium |
CN112580010A (en) * | 2020-12-23 | 2021-03-30 | 四川虹微技术有限公司 | Biological feature sharing method and device, electronic equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050160269A1 (en) * | 2004-01-20 | 2005-07-21 | Matsushita Electric Works, Ltd. | Common security key generation apparatus |
CN101350724A (en) * | 2008-08-15 | 2009-01-21 | 西安电子科技大学 | Encrypting method base on biology characteristic information |
-
2010
- 2010-10-29 CN CN 201010528004 patent/CN101977197B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050160269A1 (en) * | 2004-01-20 | 2005-07-21 | Matsushita Electric Works, Ltd. | Common security key generation apparatus |
CN101350724A (en) * | 2008-08-15 | 2009-01-21 | 西安电子科技大学 | Encrypting method base on biology characteristic information |
Non-Patent Citations (1)
Title |
---|
李鹏等: "生物特征模板保护", 《软件学报》 * |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102819760B (en) * | 2012-07-20 | 2015-12-16 | 陈平 | Data storage device, China doctor card and information security processing method thereof |
CN102819760A (en) * | 2012-07-20 | 2012-12-12 | 陈平 | Data storage device, medical information card, and information safety processing method of medical information card |
CN103368741A (en) * | 2013-05-06 | 2013-10-23 | 西安电子科技大学 | Anonymous participant identity-based signcryption method for multiple receivers |
CN103368741B (en) * | 2013-05-06 | 2016-11-30 | 西安电子科技大学 | The multi-receiver label decryption method of participant's identity anonymous |
CN106034107B (en) * | 2015-03-11 | 2019-12-10 | 西安酷派软件科技有限公司 | Data processing method and device and intelligent electronic equipment |
CN106034107A (en) * | 2015-03-11 | 2016-10-19 | 西安酷派软件科技有限公司 | Data processing method and device and intelligent electronic equipment |
CN105046127A (en) * | 2015-05-26 | 2015-11-11 | 小米科技有限责任公司 | Encryption and decryption method and apparatus |
CN105574387A (en) * | 2015-06-16 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Information security processing method and user terminal |
CN105656870A (en) * | 2015-06-29 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Data transmission method, device and system |
CN105656870B (en) * | 2015-06-29 | 2019-03-08 | 宇龙计算机通信科技(深圳)有限公司 | A kind of data transmission method, apparatus and system |
CN108292334A (en) * | 2015-10-26 | 2018-07-17 | 维萨国际服务协会 | Wireless living things feature recognition Verification System and method |
CN108292334B (en) * | 2015-10-26 | 2022-04-12 | 维萨国际服务协会 | Wireless biometric authentication system and method |
US11847652B2 (en) | 2015-10-26 | 2023-12-19 | Visa International Service Association | Wireless biometric authentication system and method |
CN111201767A (en) * | 2017-10-11 | 2020-05-26 | 高通股份有限公司 | System and method for context-based device address generation |
CN111201767B (en) * | 2017-10-11 | 2021-05-07 | 高通股份有限公司 | System and method for context-based device address generation |
CN111787400A (en) * | 2020-07-24 | 2020-10-16 | 苏州浪潮智能科技有限公司 | Video communication identity authentication method, device, equipment and readable medium |
CN112580010A (en) * | 2020-12-23 | 2021-03-30 | 四川虹微技术有限公司 | Biological feature sharing method and device, electronic equipment and storage medium |
CN112580010B (en) * | 2020-12-23 | 2024-01-30 | 四川虹微技术有限公司 | Biological feature sharing method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN101977197B (en) | 2013-09-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101977197B (en) | Multi-receiver encryption method based on biological characteristics | |
CN107070652B (en) | A kind of car networking method for secret protection that the ciphertext based on CP-ABE is anti-tamper and system | |
CN104796265B (en) | A kind of Internet of Things identity identifying method based on Bluetooth communication access | |
CN101789865B (en) | Dedicated server used for encryption and encryption method | |
CN101075874B (en) | Certifying method and system | |
CN106973056B (en) | Object-oriented security chip and encryption method thereof | |
CN102394749B (en) | Line protection method, system, information safety equipment and application equipment for data transmission | |
CN102118710A (en) | System and method for transmitting data between mobile terminals | |
CN105163309B (en) | A method of the wireless sensor network security communication based on combination pin | |
CN101359991A (en) | Public key cipher system private key escrowing system based on identification | |
CN104836657B (en) | A kind of identity-based anonymity broadcast encryption method with efficient decryption features | |
CN105429941A (en) | Multi-receiver identity anonymity signcryption method | |
CN103401839A (en) | Attribute protection based multiple authorization center encryption method | |
US6640303B1 (en) | System and method for encryption using transparent keys | |
CN103179514B (en) | A kind of mobile phone safety group's distribution method and device of sensitive information | |
CN103312506A (en) | Multi-receiver sign-cryption method for receivers with anonymous identities | |
CN102594551B (en) | Method for reliable statistics of privacy data on radio frequency identification (RFID) tag | |
CN109543434A (en) | Block chain information encryption method, decryption method, storage method and device | |
CN114095276B (en) | Intelligent home security authentication method based on Internet of things | |
CN106878322B (en) | A kind of encryption and decryption method of fixed length ciphertext and key based on attribute | |
CN105391554A (en) | Method and system for realizing fingerprint matching by using ciphertext | |
CN108880995A (en) | Strange social network user information and message based on block chain push encryption method | |
CN105577386A (en) | Data encryption method of bilateral interaction intelligent electric energy meter | |
Kaya et al. | Public key cryptography based privacy preserving multi-context RFID infrastructure | |
CN106533656A (en) | Key multilayer mixed encryption/decryption method based on WSN |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20130925 Termination date: 20181029 |