工程技术论坛
  • ISSN:3079-9023(Print) 3080-1508 (Online)
  • DOI:10.64216/3080-1508.25.09.037
  • 出版频率:月刊
  • 语言:中文
  • 收录数据库:ISSN:https://portal.issn.org/ 中国知网:https://scholar.cnki.net/journal/search

面向工业互联网访问控制的指纹隐私保护认证方案
杨涛1 王晓培2 赵帅业2(通讯作者) 韩一凡3 张亚楠2

1滨州市科技创新发展研究院,山东滨州,256600;

2滨州职业学院,山东滨州,256600;

3临沂大学,山东临沂,276000;

摘要:针对工业互联网中云端指纹认证存在的生物特征泄露风险,本文提出一种融合噪声注入、矩阵置换加密与部分欧氏距离保序计算的轻量级隐私保护方案。方案利用非对称计算架构,将密集型匹配任务安全外包至云端,客户端仅需轻量计算即可完成认证决策。在FVC2004 DB1_A数据集上实验表明,方案在保持2.1%等错误率(EER)的同时,客户端计算时间减少50%,通信开销降低40%。本方案在隐私性、精度与效率间实现良好平衡,适用于资源受限的工业终端设备。

关键词:指纹认证;工业互联网隐私保护;加密计算;生物特征安全

参考文献

[1]Gentry C. Fully homomorphic encryption using ideal lattices[C]//Proceedings of the forty-first annual ACM symposium on Theory of computing. 2009: 169-178.

[2]Yao A C C. How to generate and exchange secrets[C]//27th annual symposium on foundations of computer science (Sfcs 1986). IEEE, 1986: 162-167.

[3]Juels A, Sudan M. A Fuzzy Vault scheme. In proc. IEEE int[C]//Symp. Inf. Theory, Switzerland. 2002, 408.

[4]Su Y, Li Y, Cao Z. Gait-based privacy protection for smart wearable devices[J]. IEEE Internet of Things Journal, 2023, 11(2): 3497-3509.

[5]Liu Y, Zhou T, Yue Z, et al. Secure and efficient online fingerprint authentication scheme based on cloud computing[J]. IEEE Transactions on Cloud Computing, 2021, 11(1): 564-578.

[6]郑建忠.云计算环境下的数据加密与隐私保护技术研究[J].信息系统工程,2025,(05):40-43.

[7]Engelsma J J, Cao K, Jain A K. Learning a fixed-length fingerprint representation[J]. IEEE transactions on pattern analysis and machine intelligence, 2019, 43(6): 1981-1997.

[8]Maio D, Maltoni D, Cappelli R, et al. FVC2004: Third fingerprint verification competition[C]//International conference on biometric authentication. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004: 1-7.

[9]Paillier P. Public-key cryptosystems based on composite degree residuosity classes[C]//International conference on the theory and applications of cryptographic techniques. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999: 223-238.

上一篇:矿建工程成本控制与经济效益分析

下一篇:基于深度学习的工业巡检机器人算法研究