Paper Title:
Fuzzy Biometric Identity-Based Signature in the Standard Model
  Abstract

Using a biometric as an identity has the advantage that identities are unique if the underlying biometric is of a good quality, such as fingerprints, faces, irises, etc. However, biometric measurements are noisy and the existing identity-based systems cannot be used directly to construct this scheme. The error-tolerance property(Fuzzy) can be used to solve this problem. Based on the error-tolerance property, a new biometric identity based signature scheme is proposed. Our scheme is constructed in the standard model and achieves a strong security-full security. In addition, the security of our scheme is reduced to a generalized assumption-Computation Diffie-Hellman(CDH) assumption instead of other strong assumptions.

  Info
Periodical
Edited by
Ran Chen
Pages
3350-3354
DOI
10.4028/www.scientific.net/AMM.44-47.3350
Citation
L. Y. Zhang, Q. Wu, Y. P. Hu, "Fuzzy Biometric Identity-Based Signature in the Standard Model", Applied Mechanics and Materials, Vols. 44-47, pp. 3350-3354, 2011
Online since
December 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Le You Zhang, Qing Wu, Yu Pu Hu
Chapter 3: Signal Processing
Abstract:Biometric measurements are noisy and the existing techniques cannot be used directly to construct biometric-based scheme. Hence an...
474
Authors: Qing Wu
Chapter 1: Mechatronics and Automation
Abstract:Using a biometric as an identity has the advantage that identities are unique if the underlying biometric is of a good quality, such as...
112
Authors: Xing Chen Jiang, Jian De Zheng
Chapter 7: Computer and Numerical Technologies
Abstract:The cloud computing offers dynamically scalable online resources provisioned as a service over the Internet cheaply. However, the security...
986
Authors: Wei Zhou Zhao, Hui Zhang, Hui Zhen Wang, Hui Li Jing
Chapter 3: Numerical Methods, Computation Methods and Algorithms for Modeling, Simulation and Optimization, Data Mining and Data Processing
Abstract:This paper presents an algorithm about key management including key generation and key recovery in cryptosystem based on fingerprint and...
1907