| CPC H04L 9/3231 (2013.01) [H04L 9/0825 (2013.01); H04L 9/3247 (2013.01)] | 6 Claims |

|
1. A method for privacy protection biometric authentication, which is applied to a client and comprising:
constructing a biological data template according to a biological information data input by a user when registering;
generating a pair of public key and private key by asymmetric cryptography technology; generating encrypted biological data by a secret sharing solution and OK VS (Oblivious Key-Value Store) technology according to the biological data template and the private key;
sending the public key and the encrypted biological data to a server;
recovering the private key by OKVS technology according to the biological information data input by the user during authentication and the encrypted biological data;
constructing a signature according to the recovered private key and the corresponding public key; and sending the signature to the server, so that the server verifies the user according to the public key and the signature;
wherein said generating encrypted biological data by the secret sharing solution and the OKVS technology according to the biological data template and the private key comprises:
sharing the private key as a corresponding number of secret shares of the private key according to a number of feature points in the biological data template; and
generating the encrypted biological data by the OKVS technology according to the biological data template and the secret shares of the corresponding private key, comprising: selecting an OKVS technology randomly, adopting biological data as a key, taking the secret shares of the private key as values for encryption, and obtaining encrypted biological data; and
wherein OKVS (Oblivious Key-Value Store) is a cryptographic protocol, and KVS (Key-Value Store) includes two algorithms: Encode algorithm and Decode algorithm, wherein an input of the Encode algorithm is a set of key-value pairs {(KI, Vi)}, and if execution of the Encode algorithm 1s successful, an output of the Encode algorithm is a data structure S that stores key-value information; and wherein an input of the Decode algorithm is the data structure S that stores key information and a key ki, and an output of the Decode algorithm is a value vi corresponding to the key ki,
![]() where ⊥ represents a termination symbol output when execution of the Encode algorithm is failed.
|