期刊文献+

指纹特征点拓扑变换的非对称加解密研究 被引量:2

Study of Asymmetric Encryption and Decryption by Fingerprint Feature Point Topological Transformation
下载PDF
导出
摘要 基于指纹特征点拓扑结构变换,设计一种适合网络安全通信的非对称加解密方法。从指纹特征点拓扑结构变换与拓扑等价的角度验证加解密的可行性与正确性,分析算法的抗攻击能力与运算速度。结果表明该方法兼顾生物识别特点,具有抗攻击能力强、加解密速度快的优势,占用资源少、方法简单,适合用集成电路设计与实现。 An asymmetric encryption and decryption method based on the fingerprint feature point topological structure transformation is designed,which can be applied to the network communication security.From the perspective of the fingerprint minutiae topological structure transformation and the topological equivalent,the feasibility and correctness of encryption and decryption is verified,and its anti-attack capability and computing speed are researched.Results show that it has features of fitful for the biologic identification and the strong capability of anti-attack,the fast speed of encryption and decryption.The method is simple and takes less resource,and is suitable to be designed and realized by intergraded circuit.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第8期137-139,共3页 Computer Engineering
关键词 网络安全 指纹特征点 生物识别 拓扑变换 非对称加解密 network security; fingerprint feature point; biologic identification; topological transformation; asymmetric encryption and decryption;
  • 相关文献

参考文献6

二级参考文献20

  • 1LV Xixiang,YANG Bo.Traitor Tracing Using Identity Based Public-key Cryptography[J].Chinese Journal of Electronics,2006,15(4):687-691. 被引量:4
  • 2李仕强,王水平.基于指纹特征的考生身份认证系统[J].计算机工程,2006,32(21):160-161. 被引量:11
  • 3张立民,李章林,薛三龙,朱红军.实用型指纹识别系统的研究[J].南开大学学报(自然科学版),2007,40(1):76-80. 被引量:1
  • 4黄益栓,卢建朱.一种基于身份的认证加密新方案[J].计算机工程,2007,33(7):149-150. 被引量:8
  • 5Chor B, Fiat A, Naor M. Tracing Traitors[J]. IEEE Transactions on Information Theory, 1994, 30(6): 257-270.
  • 6Naor M, Pinkas B. Threshold Traitor Tracing[C]//Proc. of the 18th Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer-Verlag, 1998: 502-517.
  • 7Silverberg A, Staddon J, Walker J. Efficient Traitor Tracing Algorithms Using List Decoding[C]//Proc. of the 7th International Conference on the Theory and Application of Cryptology and Information Security. London, UK: Springer-Verlag, 2001: 175-192.
  • 8Kurosawa K, Desmedt Y. Optimum Traitor Tracing and Asymmetric Schemes[M]. Berlin, Germany: Springer-Verlag, 2006: 145-157.
  • 9Watanabe Y, Hanaoka G, Hideki I. Efficient Asymmetric Public-key Traitor Tracing Without Trusted Agents[M]. Berlin, Germany: Springer-Verlag, 2001:392-407.
  • 10Kiayias A, Yung M. Breaking and Repairing Asymmetric Public-key Traitor Tracing[M]. Berlin, Germany: Springer-Verlag, 2003: 32-50.

共引文献10

同被引文献16

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部