摘要
为进一步学习和讨论同态加密在基于生物特征的身份认证领域已取得的成果和存在的问题,首先简述了同态加密算法,对常用生物特征(比如:人脸、虹膜、指纹等)的同态加密及匹配方法进行了研究。最后,总结了该技术的发展历程,并根据现存的缺点,提出了未来发展趋势。
出处
《信息与电脑(理论版)》
2015年第12期147-149,共3页
China Computer & Communication
参考文献8
-
1Yao A C.How to generate and exchange secrets. Proceedings of the 27 th IEEE Symposium on Foundations of Computer Science (FOCS) . 1986
-
2Maneesh Upmanyu,Anoop M. Namboodiri,Kannan Srinathan,C. V. Jawahar.Blind authentication: a secure crypto-biometric verification protocol. IEEE Transactions on Information Forensics and Security . 2010
-
3Lagendijk, R.L.,Erkin, Z.,Barni, M.Encrypted Signal Processing for Privacy Protection: Conveying the Utility of Homomorphic Encryption and Multiparty Computation. Signal Processing . 2013
-
4Bringer, J.,Chabanne, H.,Patey, A.Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends. Signal Processing . 2013
-
5Hattori M,Matsuda N,Ito T,et al.Provably-secure cancelable biometrics using 2-DNF evaluation. Information and Media Technologies . 2012
-
6P.Failla,Mauro Barni,Dario Catalano,et al.A Privacy-compliant Fingerprint Recognition System Based on Homomorphic Encryption and Fingercode Templates. Biometrics:Theory Applications and Systems BTAS 2010Fourth IEEE International Conference on Biometrics Compendium . 2010
-
7N.D.Sarier.Practical Multi-factor Biometric Remote Authentication. Biometrics:Theory Applications and Systems BTAS 2010 Fourth IEEE International Conference on Biometrics Compendium . 2010
-
8Kok-Seng Wong,Myung-Ho Kim.A Privacy-Preserving Biometric Matching Protocol for Iris Codes Verification. 2012Third FTRA International Conference on Mobile,Ubiquitous,and Intelligent Computing . 2012
同被引文献3
-
1李鹏,田捷,杨鑫,时鹏,张阳阳.生物特征模板保护[J].软件学报,2009,20(6):1553-1573. 被引量:22
-
2徐白程,孙冬梅.生物特征模板保护综述[J].保密科学技术,2015(8):32-36. 被引量:1
-
3张宁,臧亚丽,田捷.生物特征与密码技术的融合——一种新的安全身份认证方案[J].密码学报,2015,2(2):159-176. 被引量:34
-
1任福乐,朱志祥,王雄.基于全同态加密的云计算数据安全方案[J].西安邮电学院学报,2013,18(3):92-95. 被引量:13
-
2胡持,杨庚,杨倍思,闵兆娥.基于MapReduce的并行同态加密算法[J].计算机应用,2015,35(12):3408-3412. 被引量:4
-
3锡晓峰,曹宝香.一种适用于云计算环境的改进全同态加密方案[J].计算机技术与发展,2015,25(2):144-147. 被引量:3
-
4杨淏玮,陈够喜,韩彤.同态加密算法适用范围和效率的改进及应用[J].计算机工程与设计,2017,38(2):318-322. 被引量:7
-
5吴旭东.云计算数据安全研究[J].信息网络安全,2011(9):38-40. 被引量:15
-
6我国科学家研制成功网络身份安全认证新技术[J].中国科技画报,2002(5):33-33.
-
7卫少林,卫文学.基于同态加密的垃圾邮件过滤方案设计[J].电脑知识与技术,2016,12(7X):46-47.
-
8朱丽娟,须文波,刘渊.基于指纹的网络身份认证技术的研究与实现[J].计算机工程与应用,2003,39(31):171-173. 被引量:9
-
9郑永辉,康元基,顾纯祥,董辉.环上基于属性的全同态加密体制设计[J].通信学报,2017,38(4):55-63. 被引量:4
-
10Huang Yongfeng Zhang Jiuling Li Xing.Encrypted Storage and Retrieval in Cloud Storage Applications[J].ZTE Communications,2010,8(4):31-33. 被引量:1