基于超椭圆曲线和密码安全随机数的生物特征签名加密

K. Sathya, V. Rajasekar, J. Premalatha
{"title":"基于超椭圆曲线和密码安全随机数的生物特征签名加密","authors":"K. Sathya, V. Rajasekar, J. Premalatha","doi":"10.1109/ICRTIT.2016.7569557","DOIUrl":null,"url":null,"abstract":"The biometric system stores physiological traits of user such as finger print, iris, palm, patterns of veins etc. Iris signcryption is the most successful way to improve the information security because iris consists of most accurate features compared to other authentication systems. In order to provide better security and less computational time lightweight cryptographic scheme called signcryption has introduced. Signcryption is a logical combination of encryption and signature. Cryptographically secure random numbers are used as private key in encryption segment and as key in generating signature of SHA-1 segment. Generally the random numbers passing the NIST Test suite fails to satisfy cryptographically secure requirements. An approach called twining technique along with AES in counter mode is used to generate cryptographically random numbers from the seed values of sensors. Twining technique is a novel method to minimize co linearity that occurs while extracting seed from multiple sensors housed in same environment. One of the most recent researches in the area of public key cryptography is HyperElliptic Curve Cryptography (HECC) because HECC uses smaller key size and less computational time. In the proposed biometric signcryption, biometric data, HECC and cryptographically secure random numbers are used to derive the signcrypted value of iris.","PeriodicalId":351133,"journal":{"name":"2016 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Biometric signcryption using hyperelliptic curve and cryptographically secure random number\",\"authors\":\"K. Sathya, V. Rajasekar, J. Premalatha\",\"doi\":\"10.1109/ICRTIT.2016.7569557\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The biometric system stores physiological traits of user such as finger print, iris, palm, patterns of veins etc. Iris signcryption is the most successful way to improve the information security because iris consists of most accurate features compared to other authentication systems. In order to provide better security and less computational time lightweight cryptographic scheme called signcryption has introduced. Signcryption is a logical combination of encryption and signature. Cryptographically secure random numbers are used as private key in encryption segment and as key in generating signature of SHA-1 segment. Generally the random numbers passing the NIST Test suite fails to satisfy cryptographically secure requirements. An approach called twining technique along with AES in counter mode is used to generate cryptographically random numbers from the seed values of sensors. Twining technique is a novel method to minimize co linearity that occurs while extracting seed from multiple sensors housed in same environment. One of the most recent researches in the area of public key cryptography is HyperElliptic Curve Cryptography (HECC) because HECC uses smaller key size and less computational time. In the proposed biometric signcryption, biometric data, HECC and cryptographically secure random numbers are used to derive the signcrypted value of iris.\",\"PeriodicalId\":351133,\"journal\":{\"name\":\"2016 International Conference on Recent Trends in Information Technology (ICRTIT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-04-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Recent Trends in Information Technology (ICRTIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRTIT.2016.7569557\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Recent Trends in Information Technology (ICRTIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRTIT.2016.7569557","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

生物识别系统存储用户的生理特征,如指纹、虹膜、手掌、静脉图案等。虹膜签名加密是提高信息安全性的最成功的方法,因为与其他身份验证系统相比,虹膜包含了最准确的特征。为了提供更好的安全性和更少的计算时间,引入了一种称为签名加密的轻量级加密方案。签名加密是加密和签名的逻辑组合。采用加密安全随机数作为加密段的私钥和生成SHA-1段签名的密钥。通常,通过NIST测试套件的随机数不能满足加密安全要求。一种称为缠绕技术的方法与计数器模式下的AES一起用于从传感器的种子值生成加密随机数。缠绕技术是一种消除同一环境下多个传感器种子提取过程中共线性的新方法。超椭圆曲线密码术(HyperElliptic Curve cryptography, HECC)由于其使用的密钥尺寸更小,计算时间更短,是目前公钥加密领域研究的热点之一。该方法利用生物特征数据、HECC和加密安全随机数来推导虹膜的加密值。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Biometric signcryption using hyperelliptic curve and cryptographically secure random number
The biometric system stores physiological traits of user such as finger print, iris, palm, patterns of veins etc. Iris signcryption is the most successful way to improve the information security because iris consists of most accurate features compared to other authentication systems. In order to provide better security and less computational time lightweight cryptographic scheme called signcryption has introduced. Signcryption is a logical combination of encryption and signature. Cryptographically secure random numbers are used as private key in encryption segment and as key in generating signature of SHA-1 segment. Generally the random numbers passing the NIST Test suite fails to satisfy cryptographically secure requirements. An approach called twining technique along with AES in counter mode is used to generate cryptographically random numbers from the seed values of sensors. Twining technique is a novel method to minimize co linearity that occurs while extracting seed from multiple sensors housed in same environment. One of the most recent researches in the area of public key cryptography is HyperElliptic Curve Cryptography (HECC) because HECC uses smaller key size and less computational time. In the proposed biometric signcryption, biometric data, HECC and cryptographically secure random numbers are used to derive the signcrypted value of iris.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Elaborative survey on storage technologies for XML big data: A real-time approach Design space exploration for IoT based traffic density indication system A novel image steganographic technique using fast fourier transform InfluenceRank: A machine learning approach to measure influence of Twitter users Kalman filter based phase delay reduction technique
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1