1滨州市科技创新发展研究院,山东滨州,256600;
2滨州职业学院,山东滨州,256600;
3临沂大学,山东临沂,276000;
摘要:针对工业互联网中云端指纹认证存在的生物特征泄露风险,本文提出一种融合噪声注入、矩阵置换加密与部分欧氏距离保序计算的轻量级隐私保护方案。方案利用非对称计算架构,将密集型匹配任务安全外包至云端,客户端仅需轻量计算即可完成认证决策。在FVC2004 DB1_A数据集上实验表明,方案在保持2.1%等错误率(EER)的同时,客户端计算时间减少50%,通信开销降低40%。本方案在隐私性、精度与效率间实现良好平衡,适用于资源受限的工业终端设备。
关键词:指纹认证;工业互联网隐私保护;加密计算;生物特征安全
参考文献
[1]Gentry C. Fully homomorphic encryption using ideal lattices[C]//Proceedings of the forty-first annual ACM symposium on Theory of computing. 2009: 169-178.
[2]Yao A C C. How to generate and exchange secrets[C]//27th annual symposium on foundations of computer science (Sfcs 1986). IEEE, 1986: 162-167.
[3]Juels A, Sudan M. A Fuzzy Vault scheme. In proc. IEEE int[C]//Symp. Inf. Theory, Switzerland. 2002, 408.
[4]Su Y, Li Y, Cao Z. Gait-based privacy protection for smart wearable devices[J]. IEEE Internet of Things Journal, 2023, 11(2): 3497-3509.
[5]Liu Y, Zhou T, Yue Z, et al. Secure and efficient online fingerprint authentication scheme based on cloud computing[J]. IEEE Transactions on Cloud Computing, 2021, 11(1): 564-578.
[6]郑建忠.云计算环境下的数据加密与隐私保护技术研究[J].信息系统工程,2025,(05):40-43.
[7]Engelsma J J, Cao K, Jain A K. Learning a fixed-length fingerprint representation[J]. IEEE transactions on pattern analysis and machine intelligence, 2019, 43(6): 1981-1997.
[8]Maio D, Maltoni D, Cappelli R, et al. FVC2004: Third fingerprint verification competition[C]//International conference on biometric authentication. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004: 1-7.
[9]Paillier P. Public-key cryptosystems based on composite degree residuosity classes[C]//International conference on the theory and applications of cryptographic techniques. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999: 223-238.
上一篇:矿建工程成本控制与经济效益分析