期刊文献+

一种改进的随机性模糊金库算法 被引量:3

An Improved Randomness Fuzzy Vault Scheme
在线阅读 下载PDF
导出
摘要 模糊金库(fuzzy vault)算法作为目前较流行的一种指纹密钥技术,得到了人们越来越多的关注。本文基于原有模糊金库算法,提出了一种新的模糊金库算法,该算法中:首先,上锁时利用一组随机数建立一线性函数,函数的长度不再与密钥信息的长度有关;其次,引入伪随机序列发生器,以指纹特征值作为生成元,产生随机数组用于构建模糊金库;另外,本文还提出密钥分离思想,将密钥信息分别存储于上锁过程的两部分中,使密钥信息与用户身份更牢固的绑定在一起,由此获得更高的随机性和安全性。 As a popular kind of fingerprint-key technology,the fuzzy vault scheme gets more and more attention. Based on the existing fuzzy vault algorithm ,this paper proposes a new algorithm of fuzzy vault. For the algorithm:First, using a group of random Numbers to establish a linear function when locking process, and the length of the function has no more relation to the key information:Secondly,introducing the pseudo random sequence generator,which takes fingerprint eigenvalues as generating element,generating random Numbers group used to construct fuzzy vault :The last,this letter also proposed a concept of key separation,which means the key information would be divided into tow parts and saved isolated,by that we can make the key information and user identity firmer bind together,and gaining higher randomness and security.
作者 刘艳涛 游林
出处 《科技通报》 北大核心 2011年第2期288-292,共5页 Bulletin of Science and Technology
基金 国家自然科学基金(NO.60763009)
关键词 指纹密钥 模糊金库 伪随机序列 安全性 随机性 figerprint-key fuzzy vault pseudo random sequence security randomness
  • 相关文献

参考文献8

  • 1Jain A K.Combining multiple matchers for a high security fingerprint verification system[J].Pattern Recognition Letters.1999,20:1371-1379.
  • 2Nichols P K.ICSA Guide to Cryptography[M].[S.l.] :McGraw-Hill Companies,1998.
  • 3Juels A,Sudan M.A Fuzzy Vault Scheme[C] //Proc.of IEEE International Symp.on Information Theory.Lausanne,Switzerland:[s.n.] ,2002:237-257.
  • 4李伟,郝建红,李长春.一种用于图文数据加密的新型混沌伪随机数发生器[J].中国电力教育,2007(z2):380-382. 被引量:1
  • 5Mayhew G L,Golomb SW.Linear Spans of Modified de Bruijn Sequences[J].IEEE Trans.In form.Theory,1990,36(5):1166-1167.
  • 6Chen Y,Dass S C.and Jain A K.Fingerprint Quality Indices for Predicting Authentication and Performance[J].In Proc.AVBPA,Rye Brook,NY,2005,pp:160-170.
  • 7Uludag U,Pankanti S,and Jain A K.Fuzzy Vault for Fingerprints[C] //Proc Audio and Video-based Biometric Person Authentication 2005,NY USA,July20 -22,2005:310-319.
  • 8Pankanti S,Prabhakar S,and Jain A K.On The Individuality of Fingerprints[J].IEEE Trans,on PAMI,2002,24(8):1010-1025.

二级参考文献7

同被引文献12

  • 1胡乃静,赵亮,胡金化.基于Petri网的工作流结构正确性化简验证方法[J].小型微型计算机系统,2007,28(6):1076-1079. 被引量:7
  • 2Hafedh Mili,Ali Mili,Sherif Yacoub,等.韩柯等译.基于重用的软件工程-技术、组织和控制[M].北京:电子工业出版社,2003:13-25.
  • 3施建生,伍卫国,陆丽娜.Web使用挖掘研究与频繁遍历路径识别[D].西安:西安交通大学,2000.2.
  • 4S. Jana,S. N. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy, On the effectiveness of secret key extrac- tion from wireless signal strength in real environments [C]. Beijing: In ACM MobiCom, 2009: 321-332.
  • 5Ali, Syed Taha, Vijay Sivaraman, and Diethelm Ostry. Zero reconciliation secret key generation for body-worn health monitoring devices [C]. Proceedings of the 5th ACM confe- rence on Security and Privacy in Wireless and Mobile Ne works. ACM, 2012: 39-49.
  • 6A. Juels and M. Sudan. A fuzzy vault scheme [J]. Designs, Codes, and Cryptography, 2006, 38(2): 237-257.
  • 7JUELS A, SUDAN M. A fuzzy vault scheme [C]//Proceedings of the 2002 International Symposium on Information Theory. Piscataway: IEEE, 2002:408-426.
  • 8HIEP D V, TRAN Q D, NGUYEN THI H L. A multibiometric encryption key algorithm using fuzzy vault to protect private key in BioPKI based security system[C]// Proceedings of 2010 IEEE RIVF International Conference on Computing and Communication Technologies, Research, Innovation, and Vision for the Future (RIVF). Piscataway: IEEE, 2010:1-6.
  • 9宋伟,王阿川.基于纠错码的指纹加密算法研究[J].中国安全科学学报,2009,19(9):97-101. 被引量:2
  • 10林文峰,杨帆,陈国民.基于指纹的数字信息加密算法[J].计算机工程,2010,36(8):132-134. 被引量:3

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部