期刊文献+

一种基于生物特征加密技术的数字签名方案 被引量:4

A Digital Signature Scheme Based on Biometric Encryption
原文传递
导出
摘要 结合非对称密码技术和生物特征识别技术,将生物特征数据引入非对称密码体制应用中,提出了一种基于生物特征加密技术的数字签名方案。介绍了生物特征识别技术和生物特征加密技术,同时对数字签名算法进行了比较,选择了简单有效的椭圆曲线密码算法作为本数字签名方案的算法。通过理论分析,论证了整个方案的可实现性。 This article, by taking advantages of both asymmetric cryptography and biometric identification technology, proposes a digital signature solution based on biometric encryption technology. The main feature is to introduce the biometric data into the asymmetric cryptosystem application. With introduction of the biometrics identification technology and biometrics encryption technology, various digital signature algorithms are compared. As a result, the elliptic curve cryptography algorithm, being is simple and efficient, is adopted as the final algorithm for this solution. Finally, the feasibility of the whole solution is theoretically analyzed and verified.
出处 《通信技术》 2010年第2期128-130,共3页 Communications Technology
关键词 生物识别 生物特征加密技术 数字签名 椭圆曲线密码算法 biometrics biomectic encryption digital signature ECC
  • 相关文献

参考文献5

二级参考文献29

  • 1芮挺 ,沈春林 ,Qi TIAN ,张金林 .基于HMM的击键特征用户身份认证[J].计算机工程,2005,31(2):7-9. 被引量:7
  • 2赵洁,宋如顺,姜华.基于虹膜的网络身份认证研究[J].计算机应用研究,2005,22(7):137-139. 被引量:1
  • 3刘锋,张建中.可公开验证的秘密分享机制[J].兰州大学学报(自然科学版),2006,42(2):65-67. 被引量:9
  • 4王育民 刘建伟.通信网的安全-理论与技术[M].西安:西安电子科技大学出版社,2000..
  • 5FERREIRA L C,DAHAB R.Optimistic blinded-key signatures for elgamal and related schemes[M].Berlin:Springer-Verlag,2004:254-263.
  • 6GORANTLA M C,SAXENA A.Verifiably encrypted signature scheme without random oracles[J].Berlin:Springer-Verlag,2005:357-363.
  • 7CHANG Yaojen,ZHANG Wende,CHEN Tsuhan.Biometrics-based cryptographic key generation:proc.of IEEE International Conference on Multimedia and Expo[C].Taiwan:[s.n.],2004:2203-2206.
  • 8MONROSE F,REITER M K,WETZEL S.Password hardening based on keystroke dynamics:proc.of the 6th ACM Conference of Computer and Communications Security[C].USA:ACM Press,1999:73-82.
  • 9MONROSE F,REITER M K,LI Qi,et al.Cryptographic key genera-tion from voice[J].IEEE Symposium on Security and Privacy,2001:202-213.
  • 10YIP W K,GOH A,et al.Generation of replaceable cryptographic keys from dynamic handwritten signatures[M].Berlin:Springer-Verlag,2005:509-515.

共引文献19

同被引文献32

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部